123456789101112131415161718192021222324252627282930 |
- Source: tcpreplay
- Maintainer: Christoph Biedl <debian.axhn@manchmal.in-ulm.de>
- Homepage: http://tcpreplay.appneta.com/
- Standards-Version: 4.6.0
- Vcs-Browser: https://git.in-ulm.de/cbiedl/tcpreplay
- Vcs-Git: https://git.in-ulm.de/cbiedl/tcpreplay.git
- Build-Depends: debhelper-compat (= 13),
- autogen,
- libpcap0.8-dev,
- tcpdump,
- Priority: optional
- Rules-Requires-Root: no
- Section: net
- Package: tcpreplay
- Architecture: alpha amd64 arm64 armel hppa hurd-i386 i386 ia64 kfreebsd-amd64 kfreebsd-i386 m68k mips64el mipsel powerpc ppc64 ppc64el riscv64 s390x sh4 x32
- Depends: ${misc:Depends}, ${shlibs:Depends},
- Description: Tool to replay saved tcpdump files at arbitrary speeds
- Tcpreplay is aimed at testing the performance of a NIDS by
- replaying real background network traffic in which to hide
- attacks. Tcpreplay allows you to control the speed at which the
- traffic is replayed, and can replay arbitrary tcpdump traces. Unlike
- programmatically-generated artificial traffic which doesn't
- exercise the application/protocol inspection that a NIDS performs,
- and doesn't reproduce the real-world anomalies that appear on
- production networks (asymmetric routes, traffic bursts/lulls,
- fragmentation, retransmissions, etc.), tcpreplay allows for exact
- replication of real traffic seen on real networks. It included the following
- executables tcpprep, tcprewrite, tcpreplay-edit, tcpbridge and pcap
- based captures are possible.
|