netw-ib-ox-ag-5.39.0/ 0000755 0000000 0000000 00000000000 11776302046 012672 5 ustar root root netw-ib-ox-ag-5.39.0/INSTALLWINDOWS.TXT 0000600 0000000 0000000 00000002434 11776302045 015446 0 ustar root root Installation under Windows There are 2 ways to install netwib, netwox and netwag : - automatic installation: This is easy. - step by step installation: If automatic installation does not work, use a step by step procedure to spot the problem. Automatic: ========== - Install WinPCAP version >= 3.0 yourself from http://winpcap.polito.it/ - Install Tcl/Tk yourself from ftp://ftp.activestate.com/ActiveTcl/Windows/ - Run netwib/netwox/netwag automatic installer : ./installwindows.exe [it asks some questions] Step by step: ============= WINPCAP - Install WinPCAP version >= 3.0 yourself from http://winpcap.polito.it/ TCL/TK - Install Tcl/Tk yourself from ftp://ftp.activestate.com/ActiveTcl/Windows/ NETWIB (for developers only) - Read src/netwib-bin_windows/INSTALL.TXT, and install it. - Copy src/netwib-doc_html/ where you want. NETWOX - Read src/netwox-bin_windows/INSTALL.TXT, and install it. - Copy src/netwox-doc_html/ where you want. NETWAG - Read src/netwag-bin_windows/INSTALL.TXT, and install it. - Copy src/netwag-doc_html/ where you want. END - Now, you can run: netwag539 [Read netwag-doc_html/html/lessons.html] netwox539 [Read netwox-doc_html/html/examples.html] netw-ib-ox-ag-5.39.0/INSTALLUNIX.TXT 0000600 0000000 0000000 00000004206 11776302045 015076 0 ustar root root Installation under Unix There are 2 ways to install netwib, netwox and netwag : - automatic installation: This is easy. - step by step installation: If automatic installation does not work, use a step by step procedure to spot the problem. Automatic: ========== - Install libpcap yourself (download it from http://www.tcpdump.org/ or use a package for your system) - Install libnet yourself (download it from http://www.packetfactory.net/libnet or use a package for your system) - Install Tcl/Tk yourself (download it from http://www.tcl.tk/ or use a package for your system) - Run netwib/netwox/netwag automatic installer : ./installunix.sh [it asks some questions] Step by step: ============= LIBPCAP - Install libpcap yourself (download it from http://www.tcpdump.org/ or use a package for your system) LIBNET - Install libnet yourself (download it from http://www.packetfactory.net/libnet or use a package for your system) NETWIB # cd src/netwib-src/ # less INSTALLUNIX.TXT # cd src/ # ./genemake # make # make install [must be root to run this command] # cd ../../../ NETWOX # cd src/netwox-src/ # less INSTALLUNIX.TXT # cd src/ # ./genemake # make # make install [must be root to run this command] # cd ../../../ TCL/TK - Install Tcl/Tk yourself (download it from http://www.tcl.tk/ or use a package for your system) NETWAG # cd src/netwag-src/ # less INSTALL.TXT # cd src/ # ./genemake # make # make install [must be root to run this command] # cd ../../../ DOCUMENTATION - Directories netwib-doc_html, netwox-doc_html and netwag-doc_html contains documentation. You can copy them where you want. For example: # mkdir /usr/local/doc/netw539 # cp -R src/netwib-doc_html/ /usr/local/doc/netw539 # cp -R src/netwox-doc_html/ /usr/local/doc/netw539 # cp -R src/netwag-doc_html/ /usr/local/doc/netw539 END - Now, you can run: netwag [Read netwag-doc_html/html/lessons.html] netwox [Read netwox-doc_html/html/examples.html] netw-ib-ox-ag-5.39.0/src/ 0000755 0000000 0000000 00000000000 11776302040 013453 5 ustar root root netw-ib-ox-ag-5.39.0/src/netwox-doc_html/ 0000755 0000000 0000000 00000000000 11776302040 016566 5 ustar root root netw-ib-ox-ag-5.39.0/src/netwox-doc_html/html/ 0000755 0000000 0000000 00000000000 11776302040 017532 5 ustar root root netw-ib-ox-ag-5.39.0/src/netwox-doc_html/html/examples.html 0000644 0000000 0000000 00000044740 11776302040 022247 0 ustar root root
# netwox toolnumber [parameters ...]For example :
# netwox 23 # netwox 23 --extended # netwox 23 -eTo obtain help about tool 23, run :
# netwox 23 --helpTo obtain help and full description about tool 23, run :
# netwox 23 --help2
# netwox ########## MAIN MENU 0 - leave netwox 3 - search tools a + information b + network protocol c + application protocol d + sniff e + spoof f + record g + client h + server i + tools not related to network j + administrators' tools k + attack tools Select a node (key in 03abcdefghijk): d ########## sniff 0 - leave netwox 1 - go to main menu 2 - go to previous menu 3 - search tools a - 7:Sniff b - 10:Sniff and display network statistics c - 11:Sniff and verify checksums d - 13:Obtain DLT type for sniff and spoof for each device Select a node (key in 0123abcd)> a Here is how to use this tool: Title: Sniff Note: Usage: netwox 7 [-d device] [-f filter] [-r] [-p] [-i] [-t] [-s] [-H encode] [-D encode] [-o file_dst] [-R recordencode] [-c uint32] [-C uint32] Name Description (defaultvalue) --help display this help --kbd ask missing parameters from keyboard --argfile file ask missing parameters from file -d|--device device device name (Eth0) -f|--filter filter pcap filter () -r|--rawip|+r|--no-rawip sniff at IP level (0) -p|--pause|+p|--no-pause can pause (0) -i|--ipreas|+i|--no-ipreas reassemble IP packets (0) -t|--tcpreord|+t|--no-tcpreord reorder TCP packets (0) -s|--screen|+s|--no-screen display to screen (1) -H|--hdrencode encode header encoding type for screen (array) -D|--dataencode encode data encoding type for screen (dump) -o|--outfile file_dst save in record file (dstfile.txt) -R|--recordencode recordencode encoding type for record file (bin) -c|--split-size uint32 maximum size of record in kb (0) -C|--split-age uint32 maximum age of record in seconds (0) Example: netwox 7Now, some examples are described. If they do not correspond to your needs, use the interactive help mode (or netwag's search) to find the appropriate one.
# netwox 1 ################################### Devices ################################### nu dev ethernet_hwtype mtu real_device_name 1 Lo0 loopback 1500 Loopback 2 Eth0 00:01:01:01:01:01 1500 \Device\3COM ##################################### IP ###################################### nu ip /netmask ppp point_to_point_with 1 127.0.0.1 /255.0.0.0 0 2 192.168.1.2 /255.255.254.0 0 ############################## ArpCache/Neighbor ############################# nu ethernet ip 2 00:01:01:01:01:01 192.168.1.2 2 00:02:02:02:02:02 192.168.1.254 #################################### Routes ################################### nu destination /netmask source gateway metric 1 127.0.0.1 /255.255.255.255 local 0 2 192.168.1.2 /255.255.255.255 local 0 2 192.168.1.0 /255.255.255.0 192.168.1.2 0 2 0.0.0.0 /0.0.0.0 192.168.1.2 192.168.1.254 1In this example, we see the loopback device (Lo0), and network card Eth0 (whose real name is \Device\3COM).
# netwox 3 host1 IP address: 192.168.1.1 Hostname: host1 Hostnames: host1 Eth address: 00:01:01:01:01:01This tool obtains the IP address of host1.
# netwox 3 192.168.1.1 # netwox 3 -q 192.168.1.1 # netwox 3 --query 192.168.1.1 IP address: 192.168.1.1 Hostname: host1 Hostnames: host1 Eth address: 00:01:01:01:01:01
# netwox 87 192.168.1.2 21 220 host2 FTP server QUIT 221 Goodbye.This tool is a tcp client. This commands permits to connect on the FTP server on port 21 at address 192.168.1.2. This command is equivalent to "telnet 192.168.1.2 21".
# netwox 87 www.server.com 80 GET / HTTP/1.0 _here_enter_one_blank_line_ HTTP/1.1 200 OK Date: Sat, 12 Jan 2002 08:43:27 GMT [...]Data from keyboard or network can also be encoded or decoded :
# netwox 87 192.168.1.2 21 -encode "dump" 32 32 30 20 46 54 50 20 0d 0a # 220 FTP.. QUIT 32 32 31 20 47 6f 6f 64 62 79 65 2e 0d 0a # 221 Goodbye...
# 87 -d "Eth0" -E "aa:bb:cc:dd:ee:ff " -e "00:02:02:02:02:02" -I "192.168.1.3" -i "192.168.1.2" -p "25" [...]
# 87 -d "Eth0" -E "aa:bb:cc:dd:ee:ff " -e "00:FE:FE:FE:FE:FE" -I "192.168.1.3" -i "192.168.1.2" -p "25" [...]
On host1 : On host2, then run : # netwox 89 1234 # netwox 87 host1 1234 _write_ Hello _newline_ Hello _write_ Hi _newline_ Hi _write_ Hola _newline_ Hola [...]
# netwox 7 ETH_____________________________________________________________________. | 00:01:01:01:01:01 vers 00:02:02:02:02:02 type : 0x0800 | |_______________________________________________________________________| IP______________________________________________________________________. |version | ihl | tos | totlen | |___ 4___|___ 5___|_______ 0_______|____________0054h= 84____________| | id |xxDfMf fragoffset | |____________061Dh= 1565____________|0_0_0__________0000h= 0_________| | ttl | protocol | header checksum | |_____40h= 64_____|_____01h= 1_____|_______________DF38h_______________| | source | |______________________________192.168.1.1______________________________| | destination | |______________________________192.168.1.2______________________________| ICMP_(echo request)_____________________________________________________. | type | code | checksum | |_____08h= 8_____|_____00h= 0_____|____________2829h=10281____________| 65 01 01 00 91 04 40 3C AC 91 01 00 08 09 0A 0B # e.....@<........ [...]
# netwox 7 -f "host 192.168.1.1" [...]
# netwox 7 -p -o thefile -R "mixed_wrap" Press q to exit. Press p to pause.
# netwox 15 -f thefile [...]
# netwox 15 -f thefile [...]Generally, we want to modify data before resending it. So, the file has to be edited. The procedure is quite simple :
# netwox 36 -d "Eth0" -a "1:2:3:4:5:6" -b "7:8:9:a:b:c" -l "1.2.3.4" -m "5.6.7.8" -o "1234" -p "80" -C Ethernet________________________________________________________________. | 01:02:03:04:05:06->07:08:09:0A:0B:0C type:0x0800 | |_______________________________________________________________________| IP______________________________________________________________________. |version | ihl | tos | totlen | |___4____|___5____|_____0x00=0______|_____________0x0028=40_____________| | id | DfMf offsetfrag | |____________0x095A=2394____________|0_0_0____________0x0000=0__________| | ttl | protocol | checksum | |_____0x00=0______|_____0x06=6______|______________0xA163_______________| | source | |________________________________1.2.3.4________________________________| | destination | |________________________________5.6.7.8________________________________| TCP_____________________________________________________________________. | source port | destination port | |____________0x04D2=1234____________|_____________0x0050=80_____________| | seqnum | |_________________________0x40EC052C=1089209644_________________________| | acknum | |_____________________________0x00000000=0______________________________| | doff |reserved CwEcUrAc PsRsSyFi| window | |___5____|0_0_0_0__0_0_0_0__0_0_1_0_|_____________0x0000=0______________| | checksum | urgptr | |___________0x5495=21653____________|_____________0x0000=0______________|
,____. ,________. ,________. ,____. | 192| |192 192| |192 192| |192 | | 168|____|168 168|____|168 168|____|168 | | 1| |1 20| |20 30| |30 | | 1| |254 1| |2 1| |2 | `----' `--------' `--------' `----'Tool 59 traces route to reach a computer with an open tcp port. For example, to reach computer 192.168.30.2 with a web server (port 80), with a limit of 30 hops :
# netwox 59 192.168.30.2 -p 80 -t 30 1 : 192.168.1.254 2 : 192.168.20.2 3 : 192.168.30.2 Destination reached.If we use a closed port, we obtain :
# netwox 59 192.168.30.2 -p 81 -t 30 1 : 192.168.1.254 2 : 192.168.20.2 3 : 192.168.30.2 Destination reached. Note : the TCP port 81 is closed (a reset was received).If computer is unreachable, we obtain :
# netwox 59 192.168.30.2 -p 80 -t 30 1 : 192.168.1.254 2 : 192.168.20.2 3 : 192.168.20.2 : destination unreachable - host 4 : 192.168.20.2 : destination unreachable - hostIf the number of hops is too small, we obtain :
# netwox 59 192.168.30.2 -p 81 -t 2 1 : 192.168.1.254 2 : 192.168.20.2 maxttl(2) was too short to reach the destination
# netwox 49 192.168.1.2 [...]
# netwox 73 -i 192.168.1.3-e aa:bb:cc:dd:ee:ffThen, from another computer, enter :
# ping 192.168.1.3 or # netwox 49 192.168.1.3
# netwox 67 -i 192.168.1.2 -p 20-25 192.168.1.2 - 21 : open 192.168.1.2 - 22 : open 192.168.1.2 - 10 : timeout
# netwox 30 filein fileout # netwox 30 --src-file filein --dst-file fileout
#!/usr/bin/wish for {set i 0} {$i < 3} {incr i} { puts "\nTesting $i" set ipad "192.168.0.$i" if [catch {exec netwox 3 $ipad} data] { puts "Error during exec : $data" } else { puts $data } } exit
# netwox 3 192.168.10.2 IP address: 192.168.10.2 Hostname: computer2 Hostnames: computer2,computer2.example.com Eth address: 00:40:95:46:11:23Don't forget that the destination Ethernet address has to be set to :
# netwox 41 --ip4-src "192.168.10.1" --ip4-dst "192.168.11.3" --icmp-type "8" \ --icmp-code "0" --icmp-data "12345678 'my data'" IP______________________________________________________________________. |version | ihl | tos | totlen | |___4____|___5____|_____0x00=0______|_____________0x0023=35_____________| | id | DfMf offsetfrag | |___________0x3DB4=15796____________|0_0_0____________0x0000=0__________| | ttl | protocol | checksum | |_____0x00=0______|_____0x01=1______|______________0xE6D1_______________| | source | |_____________________________192.168.10.1______________________________| | destination | |_____________________________192.168.11.3______________________________| ICMP4_echo request______________________________________________________. | type | code | checksum | |_____0x08=8______|_____0x00=0______|___________0x3F01=16129____________| 12 34 56 78 6d 79 20 64 61 74 61 # .4Vxmy dataTo obtain help about parameters, just enter "netwox 41 --help"
# netwox 37 --device Eth0 --eth-src 00:40:33:E0:2C:42 --eth-dst 00:40:95:46:41:BC \ --ip4-src "192.168.10.1" --ip4-dst "192.168.11.3" --icmp-type "8" --icmp-code "0" \ --icmp-data "12345678 'my data'" Ethernet________________________________________________________________. | 00:40:33:E0:2C:42->00:40:95:46:41:BC type:0x0800 | |_______________________________________________________________________| IP______________________________________________________________________. |version | ihl | tos | totlen | |___4____|___5____|_____0x00=0______|_____________0x0023=35_____________| | id | DfMf offsetfrag | |___________0xCCE7=52455____________|0_0_0____________0x0000=0__________| | ttl | protocol | checksum | |_____0x00=0______|_____0x01=1______|______________0x579E_______________| | source | |_____________________________192.168.10.1______________________________| | destination | |_____________________________192.168.11.3______________________________| ICMP4_echo request______________________________________________________. | type | code | checksum | |_____0x08=8______|_____0x00=0______|___________0x3F01=16129____________| 12 34 56 78 6d 79 20 64 61 74 61 # .4Vxmy dataFollowing command is equivalent, but is less easy to understand.
# netwox 37 -d Eth0 -a 00:40:33:E0:2C:42 -b 00:40:95:46:41:BC -l 192.168.10.1 \ -m 192.168.11.3 -o 8 -p 0 -q "12345678 'my data'"
# netwox 35 -d "Eth0" -a "1:2:3:4:5:6" -b "7:8:9:a:b:c" -l "1.2.3.4" \ -m "5.6.7.8" -o "1234" -p "53" Ethernet________________________________________________________________. | 01:02:03:04:05:06->07:08:09:0A:0B:0C type:0x0800 | |_______________________________________________________________________| IP______________________________________________________________________. |version | ihl | tos | totlen | |___4____|___5____|_____0x00=0______|_____________0x001C=28_____________| | id | DfMf offsetfrag | |___________0x95D5=38357____________|0_0_0____________0x0000=0__________| | ttl | protocol | checksum | |_____0x00=0______|_____0x11=17_____|______________0x14E9_______________| | source | |________________________________1.2.3.4________________________________| | destination | |________________________________5.6.7.8________________________________| UDP_____________________________________________________________________. | source port | destination port | |____________0x04D2=1234____________|_____________0x0035=53_____________| | length | checksum | |_____________0x0008=8______________|___________0xEAC3=60099____________|Now you are familiar with netwox, do not hesitate to use netwag :
# netwox 36 -d "Eth0" -a "1:2:3:4:5:6" -b "7:8:9:a:b:c" -l "1.2.3.4" \ -m "5.6.7.8" -p "80" -C Ethernet________________________________________________________________. | 01:02:03:04:05:06->07:08:09:0A:0B:0C type:0x0800 | |_______________________________________________________________________| IP______________________________________________________________________. |version | ihl | tos | totlen | |___4____|___5____|_____0x00=0______|_____________0x0028=40_____________| | id | DfMf offsetfrag | |___________0xAB70=43888____________|0_0_0____________0x0000=0__________| | ttl | protocol | checksum | |_____0x00=0______|_____0x06=6______|______________0xFF4C_______________| | source | |________________________________1.2.3.4________________________________| | destination | |________________________________5.6.7.8________________________________| TCP_____________________________________________________________________. | source port | destination port | |____________0x04D2=1234____________|_____________0x0050=80_____________| | seqnum | |_________________________0x512355F1=1361270257_________________________| | acknum | |_____________________________0x00000000=0______________________________| | doff |reserved CwEcUrAc PsRsSyFi| window | |___5____|0_0_0_0__0_0_0_0__0_0_1_0_|_____________0x0000=0______________| | checksum | urgptr | |___________0xF398=62360____________|_____________0x0000=0______________|
# netwox 7 ETH_____________________________________________________________________. | 00:40:33:e0:c2:24 vers 00:40:95:46:14:cb type : 0x0800 | |_______________________________________________________________________| IP______________________________________________________________________. |version | ihl | tos | totlen | |___ 4___|___ 5___|_______ 0_______|____________0054h= 84____________| | id |xxDfMf fragoffset | |____________0052h= 82____________|0_0_0__________0000h= 0_________| | ttl | protocol | header checksum | |_____40h= 64_____|_____01h= 1_____|_______________E502h_______________| | source | |______________________________192.168.10.1_____________________________| | destination | |______________________________192.168.10.3_____________________________| ICMP____________________________________________________________________. | type | code | checksum | |_____08h= 8_____|_____00h= 0_____|____________AA90h=43664____________| A1 02 00 00 7B D7 E1 3A 61 57 03 00 08 09 0A 0B # ....{..:aW...... 0C 0D 0E 0F 10 11 12 13 14 15 16 17 18 19 1A 1B # ................ 1C 1D 1E 1F 20 21 22 23 24 25 26 27 28 29 2A 2B # ...~ !"#$%&'()*+ 2C 2D 2E 2F 30 31 32 33 34 35 36 37 # ,-./01234567
# netwox 73 -i 192.168.10.2 -e 12:34:56:78:90:ab
Administrators and security professionals are faced to new challenges when configuring or checking an IPv6 implementation. They need IPv6 compatible tools.
Network testing requires two simple components : a tool to send network packets, and a sniffer to intercept and display them.
Most sniffers already recognize IPv6 packets (Ethereal, tcpdump, etc.).
This article describes netwox toolbox which can be used to send IPv6 packets.
The first example is a TCP packet over IPv6 over Ethernet. Install netwox or netwag and run as root:
# netwox 142 --device "Eth0" --eth-dst "0:8:9:a:b:c" --ip6-src "fec0:0:0:1::1" --ip6-dst "fec0:0:0:1::2" --tcp-src "1234" --tcp-dst "80" --tcp-synFollowing packet is sent:
Ethernet________________________________________________________. | 00:11:22:33:44:55->00:08:09:0A:0B:0C type:0x86DD | |_______________________________________________________________| IP______________________________________________________________. |version| traffic class | flow label | |___6___|_______0_______|___________________0___________________| | payload length | next header | hop limit | |___________0x0014=20___________|____0x06=6_____|_______0_______| | source | |_________________________fec0:0:0:1::1_________________________| | destination | |_________________________fec0:0:0:1::2_________________________| TCP_____________________________________________________________. | source port | destination port | |__________0x04D2=1234__________|___________0x0050=80___________| | seqnum | |_____________________0x686F31E7=1752117735_____________________| | acknum | |_________________________0x00000000=0__________________________| | doff |r|r|r|r|C|E|U|A|P|R|S|F| window | |___5___|0|0|0|0|0|0|0|0|0|0|1|0|___________0x0000=0____________| | checksum | urgptr | |__________0x12E4=4836__________|___________0x0000=0____________|Ethernet and IP header indicates that destination Ethernet address is 0:8:9:a:b:c, source IPv6 address is fec0:0:0:1::1 and destination IPv6 address is fec0:0:0:1::2.
To learn about possible parameters for tool number 142, run:
# netwox 142 --help # netwox 142 --help2
We simulate computer fec0:0:0:1::1 using another computer on the LAN. This computer does not need to be IPv6 compatible because we directly send IPv6 packet without using computer's IP stack. This computer has Ethernet address 00:11:22:33:44:55 (can be real or random). All command listed below are to be run on this computer.
First, we send a TCP SYN packet destined to port 80 of firewall. It is accepted because port 80 is open, so server sends back a TCP SYN-ACK packet. In order to send this SYN-ACK, server first asks for client Ethernet address using ICMP6 neighbor solicitation (IPv4 uses ARP). So we need 2 more tools: one to answer to Ethernet requests, and the other to see the SYN-ACK.
Netwox contains one tool to simulate the presence of a computer. This tool automatically answers to Ethernet requests. Open another window and keep running:
# netwox 73 --device "Eth0" --ips "fec0:0:0:1::1" --eths "00:11:22:33:44:55"This command answers "computer fec0:0:0:1::1 has Ethernet address 00:11:22:33:44:55" to every question.
Then open another window and run a sniffer (netwox in this example, but it can be Ethereal):
# netwox 7 -p --device "Eth0"Send the IPv6 packet destined to port 80 and see what happens in the sniffer window (don't forget to change source port "--tcp-src" for each call, for example incrementing it):
# netwox 142 --device "Eth0" --eth-src "00:11:22:33:44:55" --eth-dst "0:8:9:a:b:c" --ip6-src "fec0:0:0:1::1" --ip6-dst "fec0:0:0:1::2" --tcp-src "1235" --tcp-dst "80" --tcp-synIf port 80 is open, the sniffer will display a SYN-ACK. Here is an extract of a TCP header containing flags Ack and Syn set to 1:
| doff |r|r|r|r|C|E|U|A|P|R|S|F| window | |___5___|0|0|0|0|0|0|0|1|0|0|1|0|__________0x1680=5760__________|Meaning of receiving a SYN-ACK packet is "port 80 is open, and you are allowed to connect".
Send an IPv6 packet destined to port 81 ("--tcp-dst 81"). Depending on firewall configuration, we receive a RST (flag R set in the TCP header) or nothing, and firewall's log contains an alert message. If a SYN-ACK is received, then firewall is badly configured because port 81 is open and available.
Now, we can pick another client address such as fec0:0:0:1::3 and check everything is forbidden.
# netwox 141 --device "Eth0" --eth-src "00:11:22:33:44:55" --eth-dst "0:8:9:a:b:c" --ip6-src "fec0:0:0:1::1" --ip6-dst "fec0:0:0:1::2" --udp-src "1236" --udp-dst "80" Ethernet________________________________________________________. | 00:11:22:33:44:55->00:08:09:0A:0B:0C type:0x86DD | |_______________________________________________________________| IP______________________________________________________________. |version| traffic class | flow label | |___6___|_______0_______|___________________0___________________| | payload length | next header | hop limit | |___________0x0008=8____________|____0x11=17____|_______0_______| | source | |_________________________fec0:0:0:1::1_________________________| | destination | |_________________________fec0:0:0:1::2_________________________| UDP_____________________________________________________________. | source port | destination port | |__________0x04D4=1236__________|___________0x0050=80___________| | length | checksum | |___________0x0008=8____________|_________0xFD33=64819__________| # netwox 143 --device "Eth0" --eth-src "00:11:22:33:44:55" --eth-dst "0:8:9:a:b:c" --ip6-src "fec0:0:0:1::1" --ip6-dst "fec0:0:0:1::2" --icmp-type "128" --icmp-code "0" Ethernet________________________________________________________. | 00:11:22:33:44:55->00:08:09:0A:0B:0C type:0x86DD | |_______________________________________________________________| IP______________________________________________________________. |version| traffic class | flow label | |___6___|_______0_______|___________________0___________________| | payload length | next header | hop limit | |___________0x0008=8____________|____0x3A=58____|_______0_______| | source | |_________________________fec0:0:0:1::1_________________________| | destination | |_________________________fec0:0:0:1::2_________________________| ICMP6_echo request______________________________________________. | type | code | checksum | |___0x80=128____|____0x00=0_____|__________0x065B=1627__________| | id | seqnum | |_________0xCD94=52628__________|_________0xAE46=44614__________| | data: | |_______________________________________________________________|
You can download netwox at :
http://ntwox.sourceforge.net/
netw-ib-ox-ag-5.39.0/src/netwox-doc_html/images/ 0000755 0000000 0000000 00000000000 11776302040 020033 5 ustar root root netw-ib-ox-ag-5.39.0/src/netwox-doc_html/images/banner_netwox.jpg 0000644 0000000 0000000 00000100301 11776302040 023401 0 ustar root root JFIF H H Created with The GIMP C C <"
} !1AQa"q2#BR$3br
%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz
w !1AQaq"2B #3Rbr
$4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ? 02O_@@_7Y fρ>1~/|_|Ywt\m-k5 DĐwh|Xִ{>'um+'|G x^L,NޝC\moZjʗƛ=
"K
L ͨBSij,\vdyeL9ʲZaٞ,^hPByZNUT{R}.}@"*Vbpܑ^)