You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
41 lines
1.6 KiB
41 lines
1.6 KiB
[COPY] --- T2-COPYRIGHT-NOTE-BEGIN --- |
|
[COPY] This copyright note is auto-generated by ./scripts/Create-CopyPatch. |
|
[COPY] |
|
[COPY] T2 SDE: package/.../fragroute/fragroute.desc |
|
[COPY] Copyright (C) 2006 The T2 SDE Project |
|
[COPY] |
|
[COPY] More information can be found in the files COPYING and README. |
|
[COPY] |
|
[COPY] This program is free software; you can redistribute it and/or modify |
|
[COPY] it under the terms of the GNU General Public License as published by |
|
[COPY] the Free Software Foundation; version 2 of the License. A copy of the |
|
[COPY] GNU General Public License can be found in the file COPYING. |
|
[COPY] --- T2-COPYRIGHT-NOTE-END --- |
|
|
|
[I] A network IDS evasion tool |
|
|
|
[T] fragroute intercepts, modifies, and rewrites egress traffic, |
|
[T] implementing most of the attacks described in the Secure |
|
[T] Networks "Insertion, Evasion, and Denial of Service: Eluding |
|
[T] Network Intrusion Detection" paper. |
|
[T] It features a simple ruleset language to delay, duplicate, |
|
[T] drop, fragment, overlap, print, reorder, segment, source-route, |
|
[T] or otherwise monkey with all outbound packets destined for a |
|
[T] target host, with minimal support for randomized or probabi- |
|
[T] listic behaviour. This tool was written in good faith to aid |
|
[T] in the testing of intrusion detection systems, firewalls, and |
|
[T] basic TCP/IP stack behaviour. |
|
|
|
[U] http://www.monkey.org/~dugsong/fragroute/ |
|
|
|
[A] Dug Song <dugsong@monkey.org> |
|
[M] Christian Wiese <jeru@ixplanet.org> |
|
|
|
[C] extra/tool |
|
|
|
[L] BSD |
|
[S] Stable |
|
[V] 1.2 |
|
[P] X -----5---9 800.000 |
|
|
|
[D] 1377265574 fragroute-1.2.tar.gz http://monkey.org/~dugsong/fragroute/
|
|
|