Source: tcpreplay Maintainer: Christoph Biedl Homepage: http://tcpreplay.appneta.com/ Standards-Version: 4.6.0 Vcs-Browser: https://git.in-ulm.de/cbiedl/tcpreplay Vcs-Git: https://git.in-ulm.de/cbiedl/tcpreplay.git Build-Depends: debhelper-compat (= 13), autogen, libpcap0.8-dev, tcpdump, Priority: optional Rules-Requires-Root: no Section: net Package: tcpreplay Architecture: alpha amd64 arm64 armel hppa hurd-i386 i386 ia64 kfreebsd-amd64 kfreebsd-i386 m68k mips64el mipsel powerpc ppc64 ppc64el riscv64 s390x sh4 x32 Depends: ${misc:Depends}, ${shlibs:Depends}, Description: Tool to replay saved tcpdump files at arbitrary speeds Tcpreplay is aimed at testing the performance of a NIDS by replaying real background network traffic in which to hide attacks. Tcpreplay allows you to control the speed at which the traffic is replayed, and can replay arbitrary tcpdump traces. Unlike programmatically-generated artificial traffic which doesn't exercise the application/protocol inspection that a NIDS performs, and doesn't reproduce the real-world anomalies that appear on production networks (asymmetric routes, traffic bursts/lulls, fragmentation, retransmissions, etc.), tcpreplay allows for exact replication of real traffic seen on real networks. It included the following executables tcpprep, tcprewrite, tcpreplay-edit, tcpbridge and pcap based captures are possible.