A much easier way is to write your own usleep and drop it in /bin: ---usleep.c--- #include <stdio.h> #include <stdlib.h> #include <unistd.h>
int main (int argc, char **argv) { usleep(atoi(argv[1])); return 0; } ---usleep.c--- [note: doesn't check error conditions] 0trace worked brilliantly on my debian system after putting this usleep in place, so Kubuntu should be basically the same. On 1/8/07, Matthew Flaschen <[EMAIL PROTECTED]> wrote: > Michal Zalewski wrote: > > I'd like to announce the availability of a free security reconnaissance / > > firewall bypassing tool called 0trace. > > Good work. Are you going to put it under a free license? > > > Enough chatter - the tool is available here (Linux version): > > > > http://lcamtuf.coredump.cx/soft/0trace.tgz > > > > Note: this is a 30-minute hack that involves C code coupled with a cheesy > > shellscript. It may not work on non-Linux systems, and may fail on some > > Linuxes, too. It could be improved in a number of ways - so if you like > > it, rewrite it. > > I've been trying to get it to work on Ubuntu Edgy. That system doesn't > have usleep, so I made the following kludge: > ------------------------------------------------------------------------- > if [[ ! -x /bin/usleep && ! -x /bin/sleep ]]; then > echo "[-] Neither /bin/sleep nor /bin/usleep are found on this system, > sorry." 1>&2 > exit 1 > fi > > usleep() > { > if [ -x /bin/usleep ]; then > /bin/usleep $1 > elif [ -x /bin/sleep ]; then > /bin/sleep $(echo ".000001 * $1" | bc) > fi > } > ------------------------------------------------------------------------- > > However, that leaves me with other problems: > > [+] Waiting for traffic from target on eth0... > [+] Traffic acquired, waiting for a gap... > ./0trace.sh: line 85: printf: 0x: invalid number > ./0trace.sh: line 86: printf: 0x: invalid number > [+] Target acquired: : -> : (0/0). > [+] Setting up a sniffer... > [+] Sending probes... > Usage: ./sendprobe src_ip dst_ip sport dport seq ack > > I'm using Kubuntu Edgy. The bash version is 3.1.17(1)-release > (i486-pc-linux-gnu). Anyone have tips? > > Thanks, > > Matthew Flaschen > > > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > > > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/