Tuesday, January 11, 2005

3d Traceroute

3d Traceroute
Today I am going to show you a software program that not only gives you a truly pleasing visual display of any selected traceroute, but also provides you with all of the traceroute tools and a great number of the security specialist features that one might need to have at his disposal. Enter the world of 3d Traceroute: A software program certain to keep security specialists and sys-admins working happily well into the night.

Features, features, features:

Between you and me, 3d Traceroute's simply got it all. I dare anyone to stand before me and deny finding the traceroute tools that he or she needs within the parameters of this program. Having said that, let's really take a look at what features this program has and what they can do for you, shall we?

* 3d Traceroute's display offers multiple graphics modification options. Don't rely on some spooky-looking line of text to tell you about the target; visualize it with a full color, live map of what is actually taking place.
* You can WHOIS query to everything with one click. Instead of having to bounce from site to site, use the built-in WHOIS query tool to get the information that you need about a particular site or domain.
* There's a history window with destination ping time. Don't feel like playing with the photographic memory today? Then let the history window guide you through the path with the destination ping time of a target.
* Record and play back: record any trace and play back step by step. It is like having a live traceroute connected to a VCR! You have the ability to play and stop every part of the traceroute. This is beyond helpful when trying to spot the problem areas of a ping during a trace.
* The browser? It's already built in!
* The port scanner identifies 3,612 well-known ports. Definitely an admin's favorite! Having the abilty right there in the same program to scan for open ports will help you find weak areas that might need to be blocked on a target. Remember, unnecessary open ports are an easy target for the enemy!
* IP-Range-Scanner (scan from start-IP to end-IP): Before you can port scan a PC on a specific network, it helps to have a target first. This is where a reliable IP-Range-Scanner comes in handy. See what is really out there, even if you are not sure what the exact IP address is. Once a scan is completed, you will have a complete list of candidates to choose from.
* Analyze e-mail headers against RBLs. Into tracking down spammers? If you know what you are doing, this can be a real help.
* Connection viewer / TCP, IP, UDP, etc. statistics. When it's all said and done, it is just nice to know what protocols are being used where and how often. Thanks to the connection viewer, this is super easy to monitor.

There are a ton of other features built into this program as well, but I wanted to highlight the ones that would really matter to you. Folks, the bottom line is this: Whether you are a security expert or just a sys-admin trying to keep his/her network from falling into The Dark Side of things, having this program in your bag of tricks is going to save you a lot of running around and, more important, keep you in control.
Lockergnome's Windows Fanat

No comments: