tcpreplay 4.3.3-2 source package in Ubuntu

Changelog

tcpreplay (4.3.3-2) unstable; urgency=medium

  * Fix build error on i386

 -- Christoph Biedl <email address hidden>  Sun, 26 Jul 2020 12:35:29 +0200

Upload details

Uploaded by:
Christoph Biedl
Uploaded to:
Sid
Original maintainer:
Christoph Biedl
Architectures:
any
Section:
net
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
tcpreplay_4.3.3-2.dsc 2.1 KiB 1b8ca61cb88c44ca1a56db544b70af81edc44503c2b69035705ebb3ba4ad8549
tcpreplay_4.3.3.orig.tar.xz 730.7 KiB 5e960e2a4432f583adbd11fa0855d17b73d9e0f2d6453b749f27aacaee53bab5
tcpreplay_4.3.3.orig.tar.xz.asc 516 bytes 51e0b99636111c23b59137c01ab695aef96e0abc92b5e18f104dc9b0fdde9336
tcpreplay_4.3.3-2.debian.tar.xz 7.8 KiB 20976b838298036e869be66b85be15ffc8e736db85a2ba3f88aa714bce9586e3

Available diffs

No changes file available.

Binary packages built by this source

tcpreplay: Tool to replay saved tcpdump files at arbitrary speeds

 Tcpreplay is aimed at testing the performance of a NIDS by
 replaying real background network traffic in which to hide
 attacks. Tcpreplay allows you to control the speed at which the
 traffic is replayed, and can replay arbitrary tcpdump traces. Unlike
 programmatically-generated artificial traffic which doesn't
 exercise the application/protocol inspection that a NIDS performs,
 and doesn't reproduce the real-world anomalies that appear on
 production networks (asymmetric routes, traffic bursts/lulls,
 fragmentation, retransmissions, etc.), tcpreplay allows for exact
 replication of real traffic seen on real networks. It included the following
 executables tcpprep, tcprewrite, tcpreplay-edit, tcpbridge and pcap
 based captures are possible.

tcpreplay-dbgsym: debug symbols for tcpreplay