Source: tcpreplay Maintainer: Christoph Biedl Homepage: http://tcpreplay.appneta.com/ Standards-Version: 4.6.0 Vcs-Browser: https://git.in-ulm.de/cbiedl/tcpreplay Vcs-Git: https://git.in-ulm.de/cbiedl/tcpreplay.git Build-Depends: debhelper-compat (= 13), autogen, libpcap0.8-dev, tcpdump, Priority: optional Rules-Requires-Root: no Section: net Package: tcpreplay Architecture: any Depends: ${misc:Depends}, ${shlibs:Depends}, Description: Tool to replay saved tcpdump files at arbitrary speeds Tcpreplay is aimed at testing the performance of a NIDS by replaying real background network traffic in which to hide attacks. Tcpreplay allows you to control the speed at which the traffic is replayed, and can replay arbitrary tcpdump traces. Unlike programmatically-generated artificial traffic which doesn't exercise the application/protocol inspection that a NIDS performs, and doesn't reproduce the real-world anomalies that appear on production networks (asymmetric routes, traffic bursts/lulls, fragmentation, retransmissions, etc.), tcpreplay allows for exact replication of real traffic seen on real networks. It included the following executables tcpprep, tcprewrite, tcpreplay-edit, tcpbridge and pcap based captures are possible.