Security Basics mailing list archives
Re: Question about TCP Replay
From: <Steve.Cummings () barclayscapital com>
Date: Wed, 5 Oct 2005 17:29:39 +0100
Could try tomahawk is on sourceforge last time I looked -----Original Message----- From: Jeffrey F. Bloss <jbloss () tampabay rr com> To: security-basics () securityfocus com <security-basics () securityfocus com> Sent: Wed Oct 05 00:03:23 2005 Subject: Re: Question about TCP Replay ------------------------------------------------------------------------ For more information about Barclays Capital, please visit our web site at http://www.barcap.com. Internet communications are not secure and therefore the Barclays Group does not accept legal responsibility for the contents of this message. Although the Barclays Group operates anti-virus programmes, it does not accept responsibility for any damage whatsoever that is caused by viruses being passed. Any views or opinions presented are solely those of the author and do not necessarily represent those of the Barclays Group. Replies to this email may be monitored by the Barclays Group for operational or business reasons. ------------------------------------------------------------------------ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Tuesday 04 October 2005 11:53 am, ricci wrote:
I'm looking for a tool that can be used for replaying the captured network packet for hacking attack. What is the suggested tool to use? I have tried tcpreplay before, but I cannot have that successfully run the captured exploit packet. Also the tcpreplay win32 version is not working properly. Is there any troubleshooting forum? Also is there any alternatives we can try?
Question about the wisdom of replaying a "hacking attack" packet and your motivations aside, what sort of packet are you trying to send? Windows in particular simply won't allow you to send some types of packets, and even many *nix flavors require custom kernels. - -- Hand crafted on October 04, 2005 at 18:59:56 -0400 Outside of a dog, a book is a man's best friend. Inside of a dog, it's too dark to read. -Groucho Marx -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) iD8DBQFDQwpARHqalLqKnCkRAvjnAJ4htNLxM+7jhl4zz4M4SssWSXF7ZQCfW+b6 xZApT8TkadXvUZSFoirZ3Q0= =bqwl -----END PGP SIGNATURE----- ------------------------------------------------------------------------ For more information about Barclays Capital, please visit our web site at http://www.barcap.com. Internet communications are not secure and therefore the Barclays Group does not accept legal responsibility for the contents of this message. Although the Barclays Group operates anti-virus programmes, it does not accept responsibility for any damage whatsoever that is caused by viruses being passed. Any views or opinions presented are solely those of the author and do not necessarily represent those of the Barclays Group. Replies to this email may be monitored by the Barclays Group for operational or business reasons. ------------------------------------------------------------------------
Current thread:
- Question about TCP Replay ricci (Oct 04)
- Re: Question about TCP Replay Jeffrey F. Bloss (Oct 05)
- <Possible follow-ups>
- Re: Question about TCP Replay vachanta (Oct 05)
- RE: Question about TCP Replay Arun Vishwanathan (Oct 05)
- Re: Question about TCP Replay Steve.Cummings (Oct 05)
- RE: Question about TCP Replay Miguel Dilaj (Oct 05)