1
0

control 1.4 KB

123456789101112131415161718192021222324252627282930
  1. Source: tcpreplay
  2. Maintainer: Christoph Biedl <debian.axhn@manchmal.in-ulm.de>
  3. Homepage: http://tcpreplay.appneta.com/
  4. Standards-Version: 4.6.0
  5. Vcs-Browser: https://git.in-ulm.de/cbiedl/tcpreplay
  6. Vcs-Git: https://git.in-ulm.de/cbiedl/tcpreplay.git
  7. Build-Depends: debhelper-compat (= 13),
  8. autogen,
  9. libpcap0.8-dev,
  10. tcpdump,
  11. Priority: optional
  12. Rules-Requires-Root: no
  13. Section: net
  14. Package: tcpreplay
  15. Architecture: amd64 arm64 armel hppa hurd-i386 i386 kfreebsd-amd64 kfreebsd-i386 m68k powerpc ppc64 ppc64el riscv64 s390x sh4 x32
  16. Depends: ${misc:Depends}, ${shlibs:Depends},
  17. Description: Tool to replay saved tcpdump files at arbitrary speeds
  18. Tcpreplay is aimed at testing the performance of a NIDS by
  19. replaying real background network traffic in which to hide
  20. attacks. Tcpreplay allows you to control the speed at which the
  21. traffic is replayed, and can replay arbitrary tcpdump traces. Unlike
  22. programmatically-generated artificial traffic which doesn't
  23. exercise the application/protocol inspection that a NIDS performs,
  24. and doesn't reproduce the real-world anomalies that appear on
  25. production networks (asymmetric routes, traffic bursts/lulls,
  26. fragmentation, retransmissions, etc.), tcpreplay allows for exact
  27. replication of real traffic seen on real networks. It included the following
  28. executables tcpprep, tcprewrite, tcpreplay-edit, tcpbridge and pcap
  29. based captures are possible.