Interesting case... At first I thought it was April 1st already, but I guess
we'll see more tools like this appearing as familiarity cases (NFS-shell
anyone?)

I realize that any user can install this software by downloading and
compiling, but I'm left with two questions when it's present out of the box:

 - what privileges are needed by this software? Can any regular user run this
   and, perhaps accidentally, create havoc on the networks he's connected to?
   I guess it would be nice if only users with "Network Security" or another
   suitable profile were able to use this program.

 - The FOSS document states that there are no network services provided by
   this software and no authentication performed. The man-page however
   mentions a daemon mode that offers a Cisco-like CLI that people can use
   to monitor and launch attacks from. Who can start this daemon and how is
   access to the daemon controlled?

Joep

Reply via email to