1234567891011121314151617181920212223242526272829 |
- Source: tcpreplay
- Maintainer: Christoph Biedl <debian.axhn@manchmal.in-ulm.de>
- Homepage: http://tcpreplay.appneta.com/
- Standards-Version: 4.4.0
- Vcs-Browser: https://git.in-ulm.de/cbiedl/tcpreplay
- Vcs-Git: https://git.in-ulm.de/cbiedl/tcpreplay.git
- Build-Depends: debhelper-compat (= 12),
- autogen,
- libpcap0.8-dev,
- tcpdump,
- Priority: optional
- Section: net
- Package: tcpreplay
- Architecture: any
- Depends: ${misc:Depends}, ${shlibs:Depends},
- Description: Tool to replay saved tcpdump files at arbitrary speeds
- Tcpreplay is aimed at testing the performance of a NIDS by
- replaying real background network traffic in which to hide
- attacks. Tcpreplay allows you to control the speed at which the
- traffic is replayed, and can replay arbitrary tcpdump traces. Unlike
- programmatically-generated artificial traffic which doesn't
- exercise the application/protocol inspection that a NIDS performs,
- and doesn't reproduce the real-world anomalies that appear on
- production networks (asymmetric routes, traffic bursts/lulls,
- fragmentation, retransmissions, etc.), tcpreplay allows for exact
- replication of real traffic seen on real networks. It included the following
- executables tcpprep, tcprewrite, tcpreplay-edit, tcpbridge and pcap
- based captures are possible.
|