lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <41011d980701232051w6e325b88lb1c3dadd8669daed@mail.gmail.com>
Date: Wed, 24 Jan 2007 10:21:19 +0530
From: "crazy frog crazy frog" <i.m.crazy.frog@...il.com>
To: full-disclosure@...ts.grok.org.uk, pen-test@...urityfocus.com
Subject: Re: [New Tool]PReplay - A pcap traffic replay tool

hi all,
few people messaged me reagarding link is not working.
here is the direct link:-
http://secgeeks.com/PReplay.zip
let me know if anyone still has problems with it.
regards,
_CF


On 1/22/07, crazy frog crazy frog <i.m.crazy.frog@...il.com> wrote:
> Hi All,
>
> For some work i wanted to replay the traffic which i captured using
> the ethereal.i searched the net but i have not found any good tool for
> windows(there are many for *nix) so i decided to code my own.so here
> it is PReplay - a traffic replay tool. i hope it will be helpful to
> you all.
> from the read me:
> PReplay is a utility to send the captured data.Its main feature is
> that it will keep the timediffrence between two packets(no very
> accuratly but it works with some micro/millisecond diffrence)
> it reads the capture file and then determine the time diffrence for
> the next packet.
>
> you can give list of capture file which you want to send in the
> Preplay.ini in the [SendingFileName] section as bellow:
> 1=IPDump.cap
> 2=IPDump2.cap
>
> ; is used for comment and that line will not be read.so you can
> comment out the file name which you dont want to send as
> [SendingFileName]
> 1=IPDump.cap
> ;2=IPDump2.cap
> it will not send 2nd file.
>
> SendingFilePath, here you can specify teh directoy which contains the
> captured files.
>
> download this tool from here:
> http://secgeeks.com/preplay_a_pcap_traffic_replay_tool.html
> Regards,
> SecGeek
> http://www.secgeeks.com
>
>
> --
> ---------------------------------------
> http://www.secgeeks.com
> get a blog on secgeeks :)
> register here:-
> http://secgeeks.com/user/register
> rss feeds :-
> http://secgeeks.com/node/feed
> Submit you security articles,send them to secgeek@...geeks.com
>
> http://www.newskicks.com
> Submit and kick for new stories from all around the world.
> ---------------------------------------
>


-- 
---------------------------------------
http://www.secgeeks.com
get a blog on secgeeks :)
register here:-
http://secgeeks.com/user/register
rss feeds :-
http://secgeeks.com/node/feed
Submit you security articles,send them to secgeek@...geeks.com

http://www.newskicks.com
Submit and kick for new stories from all around the world.
---------------------------------------

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ