Though I have worked a bit with sniffers, but did not use tcpreplay and related tools before. I have downloaded and installed them and read the man pages and docs available on synfin website as well.
However, I am facing difficulty visualizing potential "uses" and "absues" of the tools. What I understood was that these tools can be used in the following two scenarios: 1- To *test* a device, say a firewall, router, etc. However, what eluded me was the kinds of test that can be performed. I think they can be some good tests to check the security or some tests with the intention of abuse? Can someone please throw some more light on this. 2- I also read somewhere that these tools can be used to generate a real background traffic to hide attacks instead of programmatically crafted traffic. What are some real life scenarios and anything that I can read for more on this. I would request the users to please enlist all the possible "uses" and "abuses" of these tools. At least one by each user. After the thread is over, I can compile the list and probaly Aaron can then include it in the tcpreplay docs. Thanks all. -- devj ------------------------------------------------------------------------- SF.Net email is sponsored by: The Future of Linux Business White Paper from Novell. From the desktop to the data center, Linux is going mainstream. Let it simplify your IT future. http://altfarm.mediaplex.com/ad/ck/8857-50307-18918-4 _______________________________________________ Tcpreplay-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/tcpreplay-users
