<ruby id="bdb3f"></ruby>

    <p id="bdb3f"><cite id="bdb3f"></cite></p>

      <p id="bdb3f"><cite id="bdb3f"><th id="bdb3f"></th></cite></p><p id="bdb3f"></p>
        <p id="bdb3f"><cite id="bdb3f"></cite></p>

          <pre id="bdb3f"></pre>
          <pre id="bdb3f"><del id="bdb3f"><thead id="bdb3f"></thead></del></pre>

          <ruby id="bdb3f"><mark id="bdb3f"></mark></ruby><ruby id="bdb3f"></ruby>
          <pre id="bdb3f"><pre id="bdb3f"><mark id="bdb3f"></mark></pre></pre><output id="bdb3f"></output><p id="bdb3f"></p><p id="bdb3f"></p>

          <pre id="bdb3f"><del id="bdb3f"><progress id="bdb3f"></progress></del></pre>

                <ruby id="bdb3f"></ruby>

                ThinkChat2.0新版上線,更智能更精彩,支持會話、畫圖、視頻、閱讀、搜索等,送10W Token,即刻開啟你的AI之旅 廣告
                --- 工具名稱: fragroute 所屬分類: Information Gathering 標簽: [kali linux,fragroute,information gathering,evasion] 創建時間: 2016-10-24 14:40:23 --- 0x00 fragroute介紹 ------------- Fragroute能夠截取、修改和重寫向外發送的報文,實現了大部分的IDS攻擊功能。Fragroute起重要作用的是一個簡單的規則設置語言,以它去實現延遲、復制、丟棄、碎片、重疊、打印、重排、分割、源路由或其他一些向目標主機發送數據包的攻擊。這個工具開發的本意是去測試入侵檢測系統、防火墻、基本的TCP/IP堆棧的行為。 該工具是為了幫助測試網絡入侵檢測系統,防火墻和基本TCP/IP堆棧行為而編寫的,請不要濫用此軟件! 工具來源:http://www.monkey.org/~dugsong/fragroute/ [fragroute主頁][1] | [Kali fragroute Repo倉庫][2] - 作者:Dug Song - 證書:3-Clause BSD 0x01 fragroute功能 --------------- fragroute - 通過嘗試規避使用分段數據包來測試NIDS ```shell root@kali:~# fragroute Usage: fragroute [-f file] dst Rules: delay first|last|random <ms> drop first|last|random <prob-%> dup first|last|random <prob-%> echo <string> ... ip_chaff dup|opt|<ttl> ip_frag <size> [old|new] ip_opt lsrr|ssrr <ptr> <ip-addr> ... ip_ttl <ttl> ip_tos <tos> order random|reverse print tcp_chaff cksum|null|paws|rexmit|seq|syn|<ttl> tcp_opt mss|wscale <size> tcp_seg <size> [old|new] ``` 0x02 fragtest功能 --------------- fragtest - 通過嘗試規避使用分段數據包來測試NIDS ```shell root@kali:~# fragtest 用法: fragtest TESTS ... <host> ?? 其中TESTS是以下(或“全部”)的任意組合: ?? ping 所有測試的先決條件 ?? ip-opt 確定支持的IP選項(BROKEN) ?? ip-tracert 確定目標的路徑 ?? frag 嘗試8字節的IP分片 ?? frag-new 嘗試8字節fwd重疊的IP分片,有利于新數據(BROKEN) ?? frag-old 嘗試8字節fwd重疊的IP分片,有利于舊數據 ?? frag-timeout 確定IP片段重組超時(BROKEN) ``` 0x03 fragroute用法示例 ----------------- ```shell root@kali:~# fragroute 192.168.1.123 fragroute: tcp_seg -> ip_frag -> ip_chaff -> order -> print 172.16.79.182.53735 > 192.168.1.123.80: S 617662291:617662291(0) win 29200 ``` 0x05 fragtest用法示例 ----------------- ```shell root@kali:~# fragtest ip-tracert frag-new 192.168.1.123 ip-tracert: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa ``` [1]: http://www.monkey.org/~dugsong/fragroute/ [2]: http://git.kali.org/gitweb/?p=packages/fragroute.git;a=summary
                  <ruby id="bdb3f"></ruby>

                  <p id="bdb3f"><cite id="bdb3f"></cite></p>

                    <p id="bdb3f"><cite id="bdb3f"><th id="bdb3f"></th></cite></p><p id="bdb3f"></p>
                      <p id="bdb3f"><cite id="bdb3f"></cite></p>

                        <pre id="bdb3f"></pre>
                        <pre id="bdb3f"><del id="bdb3f"><thead id="bdb3f"></thead></del></pre>

                        <ruby id="bdb3f"><mark id="bdb3f"></mark></ruby><ruby id="bdb3f"></ruby>
                        <pre id="bdb3f"><pre id="bdb3f"><mark id="bdb3f"></mark></pre></pre><output id="bdb3f"></output><p id="bdb3f"></p><p id="bdb3f"></p>

                        <pre id="bdb3f"><del id="bdb3f"><progress id="bdb3f"></progress></del></pre>

                              <ruby id="bdb3f"></ruby>

                              哎呀哎呀视频在线观看