# 7. Network footprinting

## <mark style="color:red;">1. Locate Network Range</mark>

visit the website

{% embed url="<https://www.arin.net/>" %}

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2FAXsGWxlCpcgRO95Kbo9W%2Fimage.png?alt=media&#x26;token=e0872ef2-80bd-4b2d-bc7c-bfb9846bd3eb" alt=""><figcaption></figcaption></figure>

## 2. Perform Network Tracerouting in Windows and Linux Machines

The route is the path that the network packet traverses between the source and destination. Network tracerouting is a process of identifying the path and hosts lying between the source and destination. Network tracerouting provides critical information such as the IP address of the hosts lying between the source and destination, which enables you to map the network topology of the organization.

```sh
tracert certifiedhacker.com
```

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2FuwMHQrjQSM8aJlQvGIrJ%2Fimage.png?alt=media&#x26;token=08098930-4f0c-4412-9f87-eb23ded78570" alt=""><figcaption></figcaption></figure>

Run **tracert /?** command to view the different options for the command, as shown in the screenshot.

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2FeNgbcfMvhXpT3jefWvrZ%2Fimage.png?alt=media&#x26;token=bef20bbd-8ecb-46be-831c-eea2540d2aaf" alt=""><figcaption></figcaption></figure>

Run **tracert -h 5 [www.certifiedhacker.com](http://www.certifiedhacker.com)** command to perform the trace, but with only 5 maximum hops allowed.

```
tracert -h 5 certifiedhacker.com
```

Maximum five hops.

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2Fil9ngyQbOgAGexuMrTMB%2Fimage.png?alt=media&#x26;token=960988e7-aed1-44d8-9cd1-9d93a7a02630" alt=""><figcaption></figcaption></figure>

### **Linux Trace route**

```
traceroute ethicalhacker.com
```

<figure><img src="https://2218819509-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrUBnODuUX4EQ8P27uc5D%2Fuploads%2FC0eAHJRAMws8O1erA4WF%2Fimage.png?alt=media&#x26;token=63def3f3-660e-4783-9e4d-1b4ceb476032" alt=""><figcaption></figcaption></figure>

## <mark style="color:red;">3. Advanced Network tracing with path analyzer pro</mark>

```
https://path-analyzer-pro.software.informer.com/2.7/
```

<mark style="color:green;">You can also use other traceroute tools such as</mark> <mark style="color:green;"></mark><mark style="color:green;">**PingPlotter**</mark> <mark style="color:green;"></mark><mark style="color:green;">(<https://www.pingplotter.com/>),</mark> <mark style="color:green;"></mark><mark style="color:green;">**Traceroute NG**</mark> <mark style="color:green;"></mark><mark style="color:green;">(<https://www.solarwinds.com>), etc. to extract additional network information of the target organization.</mark>

{% embed url="<https://www.udemy.com/course/ethical-hacker-practical/?referralCode=289CF01CF51246BCAD6C>" %}
