tcpreplay 4.4.4-1build2 source package in Ubuntu
Changelog
tcpreplay (4.4.4-1build2) noble; urgency=medium * No-change rebuild for CVE-2024-3094 -- William Grant <email address hidden> Mon, 01 Apr 2024 19:24:42 +1100
Upload details
- Uploaded by:
- William Grant
- Uploaded to:
- Noble
- Original maintainer:
- Ubuntu Developers
- Architectures:
- any
- Section:
- net
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Oracular | release | universe | net | |
Noble | release | universe | net |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
tcpreplay_4.4.4.orig.tar.xz | 730.8 KiB | 3ff9753cc43bb15e77832cee657e3030dbcdd957fa247e6abacc605689e24051 |
tcpreplay_4.4.4.orig.tar.xz.asc | 516 bytes | 2229530fa4586e0a896e962029b8eef7ae8691c3774f4cbc151ab70f2a30b1c1 |
tcpreplay_4.4.4-1build2.debian.tar.xz | 8.3 KiB | 1921cf4213b7c775d6c97f7072aee65d3d9455fa8c90b100a850c661f6484349 |
tcpreplay_4.4.4-1build2.dsc | 2.2 KiB | 2ce881a7939420b25a3a5c8bf77f3f35c6e1506bf61aaf81f6cce4aaa03b26b3 |
Available diffs
- diff from 4.4.4-1build1 to 4.4.4-1build2 (317 bytes)
Binary packages built by this source
- tcpreplay: Tool to replay saved tcpdump files at arbitrary speeds
Tcpreplay is aimed at testing the performance of a NIDS by
replaying real background network traffic in which to hide
attacks. Tcpreplay allows you to control the speed at which the
traffic is replayed, and can replay arbitrary tcpdump traces. Unlike
programmatically-generated artificial traffic which doesn't
exercise the application/protocol inspection that a NIDS performs,
and doesn't reproduce the real-world anomalies that appear on
production networks (asymmetric routes, traffic bursts/lulls,
fragmentation, retransmissions, etc.), tcpreplay allows for exact
replication of real traffic seen on real networks. It included the following
executables tcpprep, tcprewrite, tcpreplay-edit, tcpbridge and pcap
based captures are possible.
- tcpreplay-dbgsym: debug symbols for tcpreplay