File: control

package info (click to toggle)
tcpreplay 4.3.2-1
  • links: PTS, VCS
  • area: main
  • in suites: bullseye, sid
  • size: 9,316 kB
  • sloc: ansic: 32,808; sh: 4,377; makefile: 1,126; perl: 138
file content (29 lines) | stat: -rw-r--r-- 1,271 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Source: tcpreplay
Maintainer: Christoph Biedl <debian.axhn@manchmal.in-ulm.de>
Homepage: http://tcpreplay.appneta.com/
Standards-Version: 4.4.0
Vcs-Browser: https://git.in-ulm.de/cbiedl/tcpreplay
Vcs-Git: https://git.in-ulm.de/cbiedl/tcpreplay.git
Build-Depends: debhelper-compat (= 12),
    autogen,
    libpcap0.8-dev,
    tcpdump,
Priority: optional
Section: net

Package: tcpreplay
Architecture: any
Depends: ${misc:Depends}, ${shlibs:Depends},
Description: Tool to replay saved tcpdump files at arbitrary speeds
 Tcpreplay is aimed at testing the performance of a NIDS by
 replaying real background network traffic in which to hide
 attacks. Tcpreplay allows you to control the speed at which the
 traffic is replayed, and can replay arbitrary tcpdump traces. Unlike
 programmatically-generated artificial traffic which doesn't
 exercise the application/protocol inspection that a NIDS performs,
 and doesn't reproduce the real-world anomalies that appear on
 production networks (asymmetric routes, traffic bursts/lulls,
 fragmentation, retransmissions, etc.), tcpreplay allows for exact
 replication of real traffic seen on real networks. It included the following
 executables tcpprep, tcprewrite, tcpreplay-edit, tcpbridge and pcap
 based captures are possible.