Interesting case... At first I thought it was April 1st already, but I guess we'll see more tools like this appearing as familiarity cases (NFS-shell anyone?)
I realize that any user can install this software by downloading and compiling, but I'm left with two questions when it's present out of the box: - what privileges are needed by this software? Can any regular user run this and, perhaps accidentally, create havoc on the networks he's connected to? I guess it would be nice if only users with "Network Security" or another suitable profile were able to use this program. - The FOSS document states that there are no network services provided by this software and no authentication performed. The man-page however mentions a daemon mode that offers a Cisco-like CLI that people can use to monitor and launch attacks from. Who can start this daemon and how is access to the daemon controlled? Joep