Ethereal-users: RE: [Ethereal-users] packet playback

Note: This archive is from the project's previous web site, ethereal.com. This list is no longer active.

From: "McNutt, Justin M." <McNuttJ@xxxxxxxxxxxx>
Date: Sat, 29 Sep 2001 18:16:15 -0500
I actually dug up an old copy of the 1.0.1 version of tcpreplay and with
minor Makefile and tcpreplay.c hacking (quite trivial, really) got it
compiled using libpcap 0.5 and Libnet 1.0.2a (recent libs).  Works pretty
well.  Used it all day Friday.

--J

> -----Original Message-----
> From: Guy Harris [mailto:guy@xxxxxxxxxx]
> Sent: Wednesday, September 26, 2001 4:31 PM
> To: M.C. van den Bovenkamp
> Cc: Shaun Jackman; ethereal-users@xxxxxxxxxxxx
> Subject: Re: [Ethereal-users] packet playback
> 
> 
> > Look at tcpreplay:  
> http://www.anzen.com/research/nidsbench/, although
> > that site seems to be down.
> 
> I think "bought by Network Flight Recorder" may be more 
> accurate; if you
> go to
> 
> 	http://www.anzen.com/research/nidsbench/
> 
> it says
> 
> 	NFR Security, Inc. has recently completed the acquisition of the
> 	Anzen Flight Jacket (AFJ) intrusion detection product.
> 
> and NFR doesn't seem to have any obvious place on their web site:
> 
> 	http://www.nfr.com/
> 
> for free software such as that.
> 
> tcpdump.org has a CVS tree for tcpreplay:
> 
> 	http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpreplay/
> 
> so you could probably get it via anonymous CVS - see
> 
> 	http://www.tcpdump.org/
> 
> for instructions on using anonymous CVS to the tcpdump.org server, but
> check out "tcpreplay" rather than "libpcap" or "tcpdump".
> 
> It appears you can get a tarball from
> 
> 	http://packetstormsecurity.org/UNIX/IDS/nidsbench/
> 
> _______________________________________________
> Ethereal-users mailing list
> Ethereal-users@xxxxxxxxxxxx
> http://www.ethereal.com/mailman/listinfo/ethereal-users
>