update to dsniff-1.3

This commit is contained in:
dugsong 2000-01-22 07:04:30 +00:00
parent ccdebddaec
commit f8a6463287
4 changed files with 19 additions and 18 deletions

View File

@ -3,9 +3,9 @@
# Date created: 17 Dec 1999
# Whom: dugsong@monkey.org
#
# $OpenBSD: Makefile,v 1.2 2000/01/09 04:22:34 dugsong Exp $
# $OpenBSD: Makefile,v 1.3 2000/01/22 07:04:30 dugsong Exp $
DISTNAME= dsniff-1.2
DISTNAME= dsniff-1.3
CATEGORIES= security

View File

@ -1,3 +1,3 @@
MD5 (dsniff-1.2.tar.gz) = c4a054c04386d779f58177b7087a2e14
RMD160 (dsniff-1.2.tar.gz) = e558f93b7552a761963e9b72c78fdfb90c782200
SHA1 (dsniff-1.2.tar.gz) = fe59143142a6d746e6ed3e70f8b02d25cd590d77
MD5 (dsniff-1.3.tar.gz) = 3d00725cbf41a12f412b80ddec0b1624
RMD160 (dsniff-1.3.tar.gz) = fa10af80924ed7da224ae46c96afa129e0f60e53
SHA1 (dsniff-1.3.tar.gz) = 43a4aaabf19afbe60ee58e6629c1ce814c7b8ec6

View File

@ -2,12 +2,6 @@
dsniff
------
i wrote these tools with honest intentions - to audit my own network,
and to demonstrate the insecurity of plaintext network protocols.
please do not abuse this software.
what's here:
arpredirect
redirect packets from a target host (or all hosts) on the LAN
intended for another host on the LAN by forging ARP replies.
@ -18,9 +12,7 @@ arpredirect
findgw
determine the local gateway of an unknown network via passive
sniffing. the results of this program may be used in
conjunction with arpredirect to intercept all outgoing traffic
on a switch.
sniffing.
macof
flood the local network with random MAC addresses (causing
@ -28,12 +20,19 @@ macof
sniffing). a straight C port of the original Perl Net::RawIP
macof program.
tcpkill
kill specified in-progress TCP connections (useful for
libnids-based applications which require a full TCP 3-whs for
TCB creation).
dsniff
simple password sniffer. handles FTP, Telnet, HTTP, POP, IMAP,
SNMP, NFS mountd. goes beyond most sniffers in that it
minimally parses each application protocol, only saving the
"interesting" bits. also supports full TCP/IP reassembly,
courtesy of libnids (all of the following tools do, as well).
SNMP, Rlogin, NFS, X11 auth info. goes beyond most sniffers in
that it minimally parses each application protocol, only
saving the "interesting" bits. uses Berkeley DB as its output
file format, logging only unique auth info. supports full
TCP/IP reassembly, courtesy of libnids (all of the following
tools do, as well).
mailsnarf
a fast and easy way to violate the Electronic Communications

View File

@ -3,5 +3,7 @@ sbin/findgw
sbin/macof
sbin/dsniff
sbin/mailsnarf
sbin/tcpkill
sbin/urlsnarf
sbin/webspy
man/man8/dsniff.8