---
工具名稱: Firewalk
所屬分類: Information Gathering
標簽: [information gathering,recon,kali linux,firewalk]
創建時間: 2016-10-24 13:52:51
---
0x00 Firewalk介紹
-------------
Firewalk是一個主動的偵察網絡安全工具,試圖確定給定的IP轉發設備將通過哪些第4層協議。Firewalk通過發送具有比目標網關更大的TTL的TCP或UDP數據包來工作。如果網關允許流量,則它將將分組轉發到它們將到期的下一跳,并且引出ICMP_TIME_EXCEEDED消息。如果網關主機不允許流量,它可能會丟棄在那層上的數據包,我們將看不到響應。
要獲得正確的IP TTL,將導致過期的數據包超出網關,我們需要增加跳數。我們以跟蹤traceroute工作的同樣方式做,一旦我們有網關跳轉計數(在那一點掃描被稱為“綁定”),我們可以開始我們的掃描。
重要的是注意到不必達到最終目的地主機的事實,它只需要在掃描主機的網關的下游。
更多介紹:[Firewalk:高級路由跟蹤工具(Linux)][1]
工具來源:http://packetfactory.openwall.net/projects/firewalk/
[Firewalk主頁][2] | [Kali Firewalk Repo倉庫][3]
- 作者:Mike D. Schiffman, David Goldsmith
- 證書:BSD
0x01 Firewalk功能
---------------
```shell
root@kali:~# firewalk -h
Firewalk 5.0 [gateway ACL scanner]
用法:firewalk [options] target_gateway metric
??????????? [-d 0-65535] 要使用的目標端口(斜坡階段)
??????????? [-h] 程序幫助
??????????? [-i device] 接口
??????????? [-n] 不會將IP地址解析到主機名中
??????????? [-p TCP|UDP] 協議
??????????? [-r] 嚴格遵守RFC
??????????? [-S x-y,z] 端口范圍進行掃描
??????????? [-s 0-65535] 源端口
??????????? [-T 1-1000] 數據包讀取超時(以毫秒為單位)
??????????? [-t 1-25] IP生存時間
??????????? [-v] 程序版本
??????????? [-x 1-8] 預期向量
```
0x02 Firewalk用法示例
-----------------
```shell
root@kali:~# firewalk -S 8079-8081 -i eth0 -n -p TCP 192.168.1.1 192.168.0.1
Firewalk 5.0 [gateway ACL scanner]
Firewalk state initialization completed successfully.
TCP-based scan.
Ramping phase source port: 53, destination port: 33434
Hotfoot through 192.168.1.1 using 192.168.0.1 as a metric.
Ramping Phase:
1 (TTL 1): expired [192.168.1.1]
Binding host reached.
Scan bound at 2 hops.
Scanning Phase:
port 8079: *no response*
port 8080: A! open (port not listen) [192.168.0.1]
port 8081: *no response*
Scan completed successfully.
Total packets sent: 4
Total packet errors: 0
Total packets caught 2
Total packets caught of interest 2
Total ports scanned 3
Total ports open: 1
Total ports unknown: 0
```
0x02 提示
-----------------
新版Kali已移除Firewalk,如果你需要安裝Firewalk可以使用以下命令:
```shell
root@kali:~# apt-get update
root@kali:~# apt-get install firewalk
```
[1]: http://www.enet.com.cn/article/2011/0411/A20110411847512.shtml
[2]: http://packetfactory.openwall.net/projects/firewalk/
[3]: http://git.kali.org/gitweb/?p=packages/firewalk.git;a=summary
- Information Gathering
- acccheck
- ace-voip
- Amap
- Automater
- bing-ip2hosts
- braa
- CaseFile
- CDPSnarf
- cisco-torch
- Cookie Cadger
- copy-router-config
- DMitry
- dnmap
- dnsenum
- dnsmap
- DNSRecon
- dnstracer
- dnswalk
- DotDotPwn
- enum4linux
- enumIAX
- Fierce
- Firewalk
- fragroute
- fragrouter
- Ghost Phisher
- GoLismero
- goofile
- hping3
- InTrace
- iSMTP
- lbd
- Maltego Teeth
- masscan
- Metagoofil
- Miranda
- nbtscan-unixwiz
- Nmap
- ntop
- p0f
- Parsero
- Recon-ng
- SET
- smtp-user-enum
- snmp-check
- sslcaudit
- SSLsplit
- sslstrip
- SSLyze
- THC-IPV6
- theHarvester
- TLSSLed
- twofi
- URLCrazy
- Wireshark
- WOL-E
- Xplico
- Vulnerability Analysis
- BBQSQL
- BED
- cisco-auditing-tool
- cisco-global-exploiter
- cisco-ocs
- cisco-torch
- copy-router-config
- Doona
- Exploitation Tools
- Wireless Attacks
- Ghost-Phisher
- mfoc
- Forensics Tools
- Binwalk
- bulk-extractor
- Web Applications
- apache-users
- BurpSuite
- sqlmap
- w3af
- Sniffing-Spoofing
- Bettercap
- Burp Suite
- DNSChef
- Fiked
- hamster-sidejack
- HexInject
- Password Attacks
- crunch
- hashcat
- John the Ripper
- Johnny
- Hardware Hacking
- android-sdk
- apktool
- Arduino
- dex2jar
- Sakis3G
- Reverse Engineering
- apktool