tcpreplay 4.4.4-1 source package in Ubuntu

Changelog

tcpreplay (4.4.4-1) unstable; urgency=medium

  * New upstream version 4.4.4

 -- Christoph Biedl <email address hidden>  Sat, 02 Sep 2023 17:46:31 +0200

Upload details

Uploaded by:
Christoph Biedl
Uploaded to:
Sid
Original maintainer:
Christoph Biedl
Architectures:
any
Section:
net
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
tcpreplay_4.4.4-1.dsc 2.1 KiB b12936e3eed09392173c08d21d56fd8be149a53179b2504dd302ea973a810a5b
tcpreplay_4.4.4.orig.tar.xz 730.8 KiB 3ff9753cc43bb15e77832cee657e3030dbcdd957fa247e6abacc605689e24051
tcpreplay_4.4.4.orig.tar.xz.asc 516 bytes 2229530fa4586e0a896e962029b8eef7ae8691c3774f4cbc151ab70f2a30b1c1
tcpreplay_4.4.4-1.debian.tar.xz 8.1 KiB 87ca69b37072b02fac3ca048f00b2c96e6b5c1ac1992fc0c5acdf3785a255919

Available diffs

No changes file available.

Binary packages built by this source

tcpreplay: Tool to replay saved tcpdump files at arbitrary speeds

 Tcpreplay is aimed at testing the performance of a NIDS by
 replaying real background network traffic in which to hide
 attacks. Tcpreplay allows you to control the speed at which the
 traffic is replayed, and can replay arbitrary tcpdump traces. Unlike
 programmatically-generated artificial traffic which doesn't
 exercise the application/protocol inspection that a NIDS performs,
 and doesn't reproduce the real-world anomalies that appear on
 production networks (asymmetric routes, traffic bursts/lulls,
 fragmentation, retransmissions, etc.), tcpreplay allows for exact
 replication of real traffic seen on real networks. It included the following
 executables tcpprep, tcprewrite, tcpreplay-edit, tcpbridge and pcap
 based captures are possible.

tcpreplay-dbgsym: debug symbols for tcpreplay