Graphics Programs Reference
In-Depth Information
told that 192.168.0.118 is also at 00:00:AD:D1:C7:ED . These spoofed ARP packets
can be injected using a command-line packet injection tool called Nemesis.
Nemesis was originally a suite of tools written by Mark Grimes, but in the
most recent version 1.4, all functionality has been rolled up into a single
utility by the new maintainer and developer, Jeff Nathan. The source code
for Nemesis is on the LiveCD at /usr/src/nemesis-1.4/, and it has already
been built and installed.
reader@hacking:~/booksrc $ nemesis
NEMESIS -=- The NEMESIS Project Version 1.4 (Build 26)
NEMESIS Usage:
nemesis [mode] [options]
NEMESIS modes:
arp
dns
ethernet
icmp
igmp
ip
ospf (currently non-functional)
rip
tcp
udp
NEMESIS options:
To display options, specify a mode with the option "help".
reader@hacking:~/booksrc $ nemesis arp help
ARP/RARP Packet Injection -=- The NEMESIS Project Version 1.4 (Build 26)
ARP/RARP Usage:
arp [-v (verbose)] [options]
ARP/RARP Options:
-S <Source IP address>
-D <Destination IP address>
-h <Sender MAC address within ARP frame>
-m <Target MAC address within ARP frame>
-s <Solaris style ARP requests with target hardware addess set to broadcast>
-r ({ARP,RARP} REPLY enable)
-R (RARP enable)
-P <Payload file>
Data Link Options:
-d <Ethernet device name>
-H <Source MAC address>
-M <Destination MAC address>
You must define a Source and Destination IP address.
Search WWH ::




Custom Search