---
工具名稱: fragroute
所屬分類: Information Gathering
標簽: [kali linux,fragroute,information gathering,evasion]
創建時間: 2016-10-24 14:40:23
---
0x00 fragroute介紹
-------------
Fragroute能夠截取、修改和重寫向外發送的報文,實現了大部分的IDS攻擊功能。Fragroute起重要作用的是一個簡單的規則設置語言,以它去實現延遲、復制、丟棄、碎片、重疊、打印、重排、分割、源路由或其他一些向目標主機發送數據包的攻擊。這個工具開發的本意是去測試入侵檢測系統、防火墻、基本的TCP/IP堆棧的行為。
該工具是為了幫助測試網絡入侵檢測系統,防火墻和基本TCP/IP堆棧行為而編寫的,請不要濫用此軟件!
工具來源:http://www.monkey.org/~dugsong/fragroute/
[fragroute主頁][1] | [Kali fragroute Repo倉庫][2]
- 作者:Dug Song
- 證書:3-Clause BSD
0x01 fragroute功能
---------------
fragroute - 通過嘗試規避使用分段數據包來測試NIDS
```shell
root@kali:~# fragroute
Usage: fragroute [-f file] dst
Rules:
delay first|last|random <ms>
drop first|last|random <prob-%>
dup first|last|random <prob-%>
echo <string> ...
ip_chaff dup|opt|<ttl>
ip_frag <size> [old|new]
ip_opt lsrr|ssrr <ptr> <ip-addr> ...
ip_ttl <ttl>
ip_tos <tos>
order random|reverse
print
tcp_chaff cksum|null|paws|rexmit|seq|syn|<ttl>
tcp_opt mss|wscale <size>
tcp_seg <size> [old|new]
```
0x02 fragtest功能
---------------
fragtest - 通過嘗試規避使用分段數據包來測試NIDS
```shell
root@kali:~# fragtest
用法: fragtest TESTS ... <host>
?? 其中TESTS是以下(或“全部”)的任意組合:
?? ping 所有測試的先決條件
?? ip-opt 確定支持的IP選項(BROKEN)
?? ip-tracert 確定目標的路徑
?? frag 嘗試8字節的IP分片
?? frag-new 嘗試8字節fwd重疊的IP分片,有利于新數據(BROKEN)
?? frag-old 嘗試8字節fwd重疊的IP分片,有利于舊數據
?? frag-timeout 確定IP片段重組超時(BROKEN)
```
0x03 fragroute用法示例
-----------------
```shell
root@kali:~# fragroute 192.168.1.123
fragroute: tcp_seg -> ip_frag -> ip_chaff -> order -> print
172.16.79.182.53735 > 192.168.1.123.80: S 617662291:617662291(0) win 29200
```
0x05 fragtest用法示例
-----------------
```shell
root@kali:~# fragtest ip-tracert frag-new 192.168.1.123
ip-tracert: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
```
[1]: http://www.monkey.org/~dugsong/fragroute/
[2]: http://git.kali.org/gitweb/?p=packages/fragroute.git;a=summary
- Information Gathering
- acccheck
- ace-voip
- Amap
- Automater
- bing-ip2hosts
- braa
- CaseFile
- CDPSnarf
- cisco-torch
- Cookie Cadger
- copy-router-config
- DMitry
- dnmap
- dnsenum
- dnsmap
- DNSRecon
- dnstracer
- dnswalk
- DotDotPwn
- enum4linux
- enumIAX
- Fierce
- Firewalk
- fragroute
- fragrouter
- Ghost Phisher
- GoLismero
- goofile
- hping3
- InTrace
- iSMTP
- lbd
- Maltego Teeth
- masscan
- Metagoofil
- Miranda
- nbtscan-unixwiz
- Nmap
- ntop
- p0f
- Parsero
- Recon-ng
- SET
- smtp-user-enum
- snmp-check
- sslcaudit
- SSLsplit
- sslstrip
- SSLyze
- THC-IPV6
- theHarvester
- TLSSLed
- twofi
- URLCrazy
- Wireshark
- WOL-E
- Xplico
- Vulnerability Analysis
- BBQSQL
- BED
- cisco-auditing-tool
- cisco-global-exploiter
- cisco-ocs
- cisco-torch
- copy-router-config
- Doona
- Exploitation Tools
- Wireless Attacks
- Ghost-Phisher
- mfoc
- Forensics Tools
- Binwalk
- bulk-extractor
- Web Applications
- apache-users
- BurpSuite
- sqlmap
- w3af
- Sniffing-Spoofing
- Bettercap
- Burp Suite
- DNSChef
- Fiked
- hamster-sidejack
- HexInject
- Password Attacks
- crunch
- hashcat
- John the Ripper
- Johnny
- Hardware Hacking
- android-sdk
- apktool
- Arduino
- dex2jar
- Sakis3G
- Reverse Engineering
- apktool