aboutsummaryrefslogtreecommitdiff
path: root/net/nemesis/pkg-descr
diff options
context:
space:
mode:
authorYen-Ming Lee <leeym@FreeBSD.org>2003-07-01 17:39:00 +0000
committerYen-Ming Lee <leeym@FreeBSD.org>2003-07-01 17:39:00 +0000
commit1f94eebf99e29414292c3aa9c2bdffb934926f56 (patch)
tree196d5e0a03768753150490c68e4af77918220630 /net/nemesis/pkg-descr
parent30f68fa24bb05a011cf022c0990b680680dba944 (diff)
downloadports-1f94eebf99e29414292c3aa9c2bdffb934926f56.tar.gz
ports-1f94eebf99e29414292c3aa9c2bdffb934926f56.zip
Notes
Diffstat (limited to 'net/nemesis/pkg-descr')
-rw-r--r--net/nemesis/pkg-descr36
1 files changed, 13 insertions, 23 deletions
diff --git a/net/nemesis/pkg-descr b/net/nemesis/pkg-descr
index 34bf888a26fc..56c87daa36df 100644
--- a/net/nemesis/pkg-descr
+++ b/net/nemesis/pkg-descr
@@ -1,31 +1,21 @@
-The Nemesis Project is designed to be a commandline-based, portable human IP
-stack for UNIX/Linux. The suite is broken down by protocol, and should allow
-for useful scripting of injected packet streams from simple shell scripts.
+The Nemesis Project is designed to be a command line based, portable human IP
+stack for UNIX-like and Windows sytems. The suite is broken down by protocol,
+and should allow for useful scripting of injected packets from simple shell
+scripts.
Key Features:
-+ ARP/RARP, DNS, ICMP, IGMP, OSPF, RIP, TCP, UDP protocol support
++ ARP/RARP, DNS, ETHERNET, ICMP, IGMP, IP, OSPF*, RIP, TCP, UDP protocol support
+ Layer 2 or Layer 3 injection (by presence/absence of -d <dev> switch)
-+ Packet Payload from file
-+ tested on OpenBSD, NetBSD, FreeBSD, Solaris/Trusted Solaris, Linux,
- and Mac OS X
+ on UNIX-like systems.
++ Layer 2 injection on Windows systems (regardless of whether
+ -d <device number> is used.
++ Packet payload from file
++ IP and TCP options from file
++ Tested on OpenBSD, Linux, Solaris, Mac OS X and Windows 2000
-Example usage:
+Each supported protocol uses its own protocol "injector" which is accompanied
+by a man page explaning its functionality.
-* nemesis-tcp -v -S 192.168.1.1 -D 192.168.2.2 -fS -fA -y 22 -P foo
- send TCP packet (SYN/ACK) with payload from ascii file 'foo' to target's
- ssh port from 192.168.1.1 to 192.168.2.2. (-v allows a stdout visual of
- current injected packet)
-
-* nemesis-icmp -S 10.10.10.3 -D 10.10.10.1 -G 10.10.10.3 -i 5
- send ICMP REDIRECT (network) packet from 10.10.10.3 to 10.10.10.1
- with preferred gateway as source address.
-
-* nemesis-arp -v -d ne0 -H 0:1:2:3:4:5 -S 10.11.30.5 -D 10.10.15.1
- send ARP packet through device 'ne0' from hardware source address
- 00:01:02:03:04:05 with IP source address 10.11.30.5 to destination IP
- address 10.10.15.1 with broadcast destination hardware address.
- In other words, who-has the mac address of 10.10.15.1, tell 10.11.30.5
- - assuming 00:01:02:03:04:05 is the source mac address of our 'ne0' device.
WWW: http://www.packetfactory.net/projects/nemesis/