|
ドイツ語:Mausezahn ((:ˈmaʊ̯zəˌʦaːn), German for "mouse tooth") is a fast network traffic generator written in C which allows the user to craft nearly every possible and "impossible" packet. Since version 0.31 Mausezahn is open source in terms of the GPLv2. Herbert Haas, the original developer of Mausezahn, died on 25 June 2011.〔(Personal Webpage of Herbert Haas )〕 The project has been incorporated into the netsniff-ng toolkit, and continues to be developed there.〔(Webpage of Netsniff-NG with Mausezahn )〕 Typical applications of Mausezahn include: * Testing or stressing IP multicast networks * Penetration testing of firewalls and IDS * Finding weaknesses in network software or appliances * Creation of malformed packets to verify whether a system processes a given protocol correctly * Didactical demonstrations as lab utility Mausezahn allows sending an arbitrary sequence of bytes directly out of the network interface card. An integrated packet builder provides a simple command line interface for more complicated packets. Since version 0.38, Mausezahn offers a multi-threaded mode〔(Introduction to MOPS )〕 with Cisco-style command line interface. == Features == As of version 0.38 Mausezahn supports the following features:〔(Mausezahn User Guide )〕 * Jitter measurement via Real-time Transport Protocol (RTP) packets * VLAN tagging (arbitrary number of tags) * MPLS label stacks (arbitrary number of labels) * BPDU packets as used by the Spanning Tree Protocol (PVST+ is also supported) * Cisco Discovery Protocol messages * Link Layer Discovery Protocol messages * IGMP version 1 and 2 query and report messages * DNS messages * ARP messages * IP, UDP, and TCP header creation * ICMP packets * Syslog messages * Address, port, and TCP sequence number sweeps * Random MAC or IP addresses, FQDN addresses * A very high packet transmission rate (approximately 100,000 packets per second) Mausezahn only sends exactly the packet the user has specified. Therefore it is rather less suited for vulnerability audits where additional algorithms are required to detect open ports behind a firewall and to automatically evade intrusion detection systems (IDS). However, a network administrator could implement audit routines via a script that utilizes Mausezahn for creating the actual packets. 抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「Mausezahn」の詳細全文を読む スポンサード リンク
|