ورود

View Full Version : packet crafter with c



nima0102
دوشنبه 15 بهمن 1386, 15:06 عصر
با سلام
یه packet crafter با c++ برای لینوکس البته با سورسش می تونید معرفی کنید، اگه ساده باشه بهتره چون می خوام روند کار رو ببینم
با تشکر

Inprise
دوشنبه 15 بهمن 1386, 18:53 عصر
http://www.packetfactory.net/libnet
برای ویندوز هم ترجمه شده . سایت eeye‌ رو باید بگردی .

ICEMAN
سه شنبه 16 بهمن 1386, 08:27 صبح
http://www.packetfactory.net/libnet
برای ویندوز هم ترجمه شده . سایت eeye‌ رو باید بگردی .


سلام ..
این Libnet فرقش با WinpCap چیه ؟
توی مثال های خود سایت Packetfactory.net هم یه چیزایی برای win32 داره

ICEMAN
سه شنبه 16 بهمن 1386, 08:56 صبح
http://www.amazon.com/exec/obidos/tg/detail/-/0471205443/qid=1038419702/sr=8-1/ref=sr_8_1/002-0639109-8275203?v=glance&s=books&n=507846


Book Description
Learn how to protect your network with this guide to building complete and fully functional network security tools

Although open source network security tools come in all shapes and sizes, a company will eventually discover that these tools are lacking in some area—whether it's additional functionality, a specific feature, or a narrower scope.

Written by security expert Mike Schiffman, this comprehensive book will show you how to build your own network security tools that meet the needs of your company. To accomplish this, you'll first learn about the Network Security Tool Paradigm in addition to currently available components including libpcap, libnet, libnids, libsf, libdnet, and OpenSSL. Schiffman offers a detailed discussion of these components, helping you gain a better understanding of the native datatypes and exported functions. Next, you'll find several key techniques that are built from the components as well as easy-to-parse programming examples. The book then ties the model, code, and concepts together, explaining how you can use this information to craft intricate and robust security programs. Schiffman provides you with cost-effective, time-saving guidance on how to build customized network security tools using existing components. He explores:

* A multilayered model for describing network security tools
* The ins and outs of several specific security-related components
* How to combine these components into several useful network security techniques
* Four different classifications for network security tools: passive reconnaissance, active reconnaissance, attack and penetration, and defensive

How to combine techniques to build customized network security tools
The companion Web site contains all of the code from the book.