update to dsniff-1.3
This commit is contained in:
parent
ccdebddaec
commit
f8a6463287
@ -3,9 +3,9 @@
|
|||||||
# Date created: 17 Dec 1999
|
# Date created: 17 Dec 1999
|
||||||
# Whom: dugsong@monkey.org
|
# Whom: dugsong@monkey.org
|
||||||
#
|
#
|
||||||
# $OpenBSD: Makefile,v 1.2 2000/01/09 04:22:34 dugsong Exp $
|
# $OpenBSD: Makefile,v 1.3 2000/01/22 07:04:30 dugsong Exp $
|
||||||
|
|
||||||
DISTNAME= dsniff-1.2
|
DISTNAME= dsniff-1.3
|
||||||
|
|
||||||
CATEGORIES= security
|
CATEGORIES= security
|
||||||
|
|
||||||
|
@ -1,3 +1,3 @@
|
|||||||
MD5 (dsniff-1.2.tar.gz) = c4a054c04386d779f58177b7087a2e14
|
MD5 (dsniff-1.3.tar.gz) = 3d00725cbf41a12f412b80ddec0b1624
|
||||||
RMD160 (dsniff-1.2.tar.gz) = e558f93b7552a761963e9b72c78fdfb90c782200
|
RMD160 (dsniff-1.3.tar.gz) = fa10af80924ed7da224ae46c96afa129e0f60e53
|
||||||
SHA1 (dsniff-1.2.tar.gz) = fe59143142a6d746e6ed3e70f8b02d25cd590d77
|
SHA1 (dsniff-1.3.tar.gz) = 43a4aaabf19afbe60ee58e6629c1ce814c7b8ec6
|
||||||
|
@ -2,12 +2,6 @@
|
|||||||
dsniff
|
dsniff
|
||||||
------
|
------
|
||||||
|
|
||||||
i wrote these tools with honest intentions - to audit my own network,
|
|
||||||
and to demonstrate the insecurity of plaintext network protocols.
|
|
||||||
please do not abuse this software.
|
|
||||||
|
|
||||||
what's here:
|
|
||||||
|
|
||||||
arpredirect
|
arpredirect
|
||||||
redirect packets from a target host (or all hosts) on the LAN
|
redirect packets from a target host (or all hosts) on the LAN
|
||||||
intended for another host on the LAN by forging ARP replies.
|
intended for another host on the LAN by forging ARP replies.
|
||||||
@ -18,9 +12,7 @@ arpredirect
|
|||||||
|
|
||||||
findgw
|
findgw
|
||||||
determine the local gateway of an unknown network via passive
|
determine the local gateway of an unknown network via passive
|
||||||
sniffing. the results of this program may be used in
|
sniffing.
|
||||||
conjunction with arpredirect to intercept all outgoing traffic
|
|
||||||
on a switch.
|
|
||||||
|
|
||||||
macof
|
macof
|
||||||
flood the local network with random MAC addresses (causing
|
flood the local network with random MAC addresses (causing
|
||||||
@ -28,12 +20,19 @@ macof
|
|||||||
sniffing). a straight C port of the original Perl Net::RawIP
|
sniffing). a straight C port of the original Perl Net::RawIP
|
||||||
macof program.
|
macof program.
|
||||||
|
|
||||||
|
tcpkill
|
||||||
|
kill specified in-progress TCP connections (useful for
|
||||||
|
libnids-based applications which require a full TCP 3-whs for
|
||||||
|
TCB creation).
|
||||||
|
|
||||||
dsniff
|
dsniff
|
||||||
simple password sniffer. handles FTP, Telnet, HTTP, POP, IMAP,
|
simple password sniffer. handles FTP, Telnet, HTTP, POP, IMAP,
|
||||||
SNMP, NFS mountd. goes beyond most sniffers in that it
|
SNMP, Rlogin, NFS, X11 auth info. goes beyond most sniffers in
|
||||||
minimally parses each application protocol, only saving the
|
that it minimally parses each application protocol, only
|
||||||
"interesting" bits. also supports full TCP/IP reassembly,
|
saving the "interesting" bits. uses Berkeley DB as its output
|
||||||
courtesy of libnids (all of the following tools do, as well).
|
file format, logging only unique auth info. supports full
|
||||||
|
TCP/IP reassembly, courtesy of libnids (all of the following
|
||||||
|
tools do, as well).
|
||||||
|
|
||||||
mailsnarf
|
mailsnarf
|
||||||
a fast and easy way to violate the Electronic Communications
|
a fast and easy way to violate the Electronic Communications
|
||||||
|
@ -3,5 +3,7 @@ sbin/findgw
|
|||||||
sbin/macof
|
sbin/macof
|
||||||
sbin/dsniff
|
sbin/dsniff
|
||||||
sbin/mailsnarf
|
sbin/mailsnarf
|
||||||
|
sbin/tcpkill
|
||||||
sbin/urlsnarf
|
sbin/urlsnarf
|
||||||
sbin/webspy
|
sbin/webspy
|
||||||
|
man/man8/dsniff.8
|
||||||
|
Loading…
Reference in New Issue
Block a user