You are on page 1of 2

UNIVERSITY OF MAKATI

J.P. Rizal Ext., West Rembo, Makati City

COLLEGE OF COMPUTING AND INFORMATION SCIENCES

Asynchronous Activity

4. TRACERT

The traceroute (tracert) command is used to trace the route during the transmission of
the data packet over to the destination host. It provides information such as the number of hops
taken, latency, router DNS name, and router IP.

In digital forensics, the tracert command can be helpful to determine who owns or the
provider of the router (example: att (AT&T), bhn (Bright House Network), xo, akamai), its
geographical location (e.g., mia (Miami), orld71 (Orlando), and the type of the router (e.g.,
res.spectrum.com residential router) by looking at the DNS name of each router on its way to
the destination.

In the case of a security breach, traceroute can be used to track the attack's course and
identify its source. With the aid of tracert’s information, vulnerabilities may be found, suitable
security measures can be put in place, and potential cyberattacks can be avoided. Traceroute
aids in maintaining network security and preventing unwanted access or data breaches by
confirming that data packets are traveling along the intended path and making it through the
necessary security checkpoints, such as firewalls, VPNs, and etc. It is also useful for
troubleshooting network issues because they can identify which network node is causing packet
loss, latency, or other issues.
UNIVERSITY OF MAKATI
J.P. Rizal Ext., West Rembo, Makati City

COLLEGE OF COMPUTING AND INFORMATION SCIENCES

Asynchronous Activity

BALBAERA, KAYRON DAVE A.

Screenshot of Subscription

Watch History

You might also like