aboutsummaryrefslogtreecommitdiffstats
path: root/net/nemesis/pkg-descr
blob: 138386905c8296ebb139756bb4b40f8866b88293 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
The Nemesis Project is designed to be a commandline-based, portable human IP
stack for UNIX/Linux.  The suite is broken down by protocol, and should allow
for useful scripting of injected packet streams from simple shell scripts.

Key Features:

+ ARP/RARP, DNS, ICMP, IGMP, OSPF, RIP, TCP, UDP protocol support
+ Layer 2 or Layer 3 injection (by presence/absence of -d <dev> switch)
+ Packet Payload from file
+ tested on OpenBSD, NetBSD, FreeBSD, Solaris/Trusted Solaris, Linux,
  and Mac OS X

Example usage:

* nemesis-tcp -v -S 192.168.1.1 -D 192.168.2.2 -fS -fA -y 22 -P foo
  send TCP packet (SYN/ACK) with payload from ascii file 'foo' to target's
  ssh port from 192.168.1.1 to 192.168.2.2. (-v allows a stdout visual of
  current injected packet)
       
* nemesis-icmp -S 10.10.10.3 -D 10.10.10.1 -G 10.10.10.3 -i 5
  send ICMP REDIRECT (network) packet from 10.10.10.3 to 10.10.10.1
  with preferred gateway as source address.  

* nemesis-arp -v -d ne0 -H 0:1:2:3:4:5 -S 10.11.30.5 -D 10.10.15.1
  send ARP packet through device 'ne0' from hardware source address
  00:01:02:03:04:05 with IP source address 10.11.30.5 to destination IP
  address 10.10.15.1 with broadcast destination hardware address.
  In other words, who-has the mac address of 10.10.15.1, tell 10.11.30.5 
  - assuming 00:01:02:03:04:05 is the source mac address of our 'ne0' device.

WWW:  http://www.packetfactory.net/nemesis/