summaryrefslogtreecommitdiff
path: root/doc/src/testingtools.html
blob: 491b1956cc964b306eff97a8b90d14763f7d04ea (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
<html>
<head>
<title>FreeS/WAN survey of testing tools</title>
<!-- Changed by: Michael Richardson, 02-Jan-2002 -->
<meta name="keywords" content="Linux, IPsec, VPN, security, FreeSWAN, testing, nettools">

<!--

Written by Michael Richardson for the Linux FreeS/WAN project
Freely distributable under the GNU General Public License

More information at www.freeswan.org
Feedback to users@lists.freeswan.org

$Id: testingtools.html,v 1.1 2004/03/15 20:35:24 as Exp $

$Log: testingtools.html,v $
Revision 1.1  2004/03/15 20:35:24  as
added files from freeswan-2.04-x509-1.5.3

Revision 1.1  2002/03/12 20:57:25  mcr
	review of tools used for testing FreeSWAN systems.


-->
</head>

<body>

<h1>Survey of testing tools</h1>

<h2><A HREF="http://freshmeat.net/projects/apsend">http://freshmeat.net/projects/apsend</A></h2>

<P>
About: <A HREF="">APSEND</A> is a TCP/IP packet sender to test firewalls and other
network applications. It also includes a syn flood option, the land
DoS attack, a DoS attack against tcpdump running on a UNIX-based
system, a UDP-flood attack, and a ping flood option. It currently
supports the following protocols: IP, TCP, UDP, ICMP, Ethernet frames
and you can also build any other type of protocol using the generic
option. The scripting language of apsend is already written, but not
yet public.   
</P>

<P>
STATUS: The public web site seems to have died
</P>

<h2><A HREF="http://freshmeat.net/projects/hping2">http://freshmeat.net/projects/hping2</A></h2>

<P>
About: <A HREF="http://www.hping.org/">hping2</A> is a network tool
able to send custom ICMP/UDP/TCP packets and to display target replies
like ping does with ICMP replies. It handles fragmentation and
arbitrary packet body and size, and can be used to transfer files
under supported protocols. Using hping2, you can: test firewall rules,
perform [spoofed] port scanning, test net performance using different
protocols, packet size, TOS (type of service), and fragmentation, do
path MTU discovery, tranfer files (even between really Fascist
firewall rules), perform traceroute-like actions under different
protocols, fingerprint remote OSs, audit a TCP/IP stack, etc. hping2
is a good tool for learning TCP/IP.  
</P>

<P>
This utility has rather complicated usage and no man page at present. 
The documentation is supposed to be in HPING2-HOWTO, but that file
seems to be absent. 
</P>

<h2><A HREF="http://freshmeat.net/projects/icmpush">http://freshmeat.net/projects/icmpush</A></h2>

<P>
About: ICMPush is a tool that send ICMP packets fully customized from command
line. This release supports the ICMP error types Unreach, Parameter
Problem, Redirect and Source Quench and the ICMP information types
Timestamp, Address Mask Request, Information Request, Router
Solicitation, Router Advertisement and Echo Request. Also supports
ip-spoofing, broadcasting and other useful features. It's really a
powerful program for testing and debugging TCP/IP stacks and networks.
</P>

<P>
</P>

<h2><A HREF="http://freshmeat.net/projects/isic">http://freshmeat.net/projects/isic</A></h2>

<P>
ISIC sends randomly generated packets to a target computer. Its
primary uses are to stress-test an IP stack, to find leaks in a
firewall, and to test the implementation of IDSes and firewalls. The
user can specify how often the packets will be frags, have IP options,
TCP options, an urgent pointer, etc. Programs for TCP, UDP, ICMP,
IP w/ random protocols, and random ethernet frames are included.  
</P>

<h2><A HREF="http://freshmeat.net/projects/sendpacket">http://freshmeat.net/projects/sendpacket</A></h2>

<P>
Send Packet is a small but powerful program to test how your network
responds to specific packet content. Via a config file and/or command
line parameters, you can forge (modify the headers of) your own
TCP/UDP/ICMP/IP packets and send them through your network. Also,
following the Easy Sniffer modular philosophy, you can specify wich
modules you'd like to build.  
</P>

<h2><A HREF="http://freshmeat.net/projects/aicmpsend/">http://freshmeat.net/projects/aicmpsend/</A></h2>

<P>
AICMPSEND is an ICMP sender with many features including ICMP
flooding and spoofing. All ICMP flags and codes are implemented. You
can use this program for various DoS attacks, for ICMP flooding and
to test firewalls.  
</P>

<h2><A HREF="http://freshmeat.net/projects/sendip/">http://freshmeat.net/projects/sendip/</A></h2>

<P>
SendIP is a command-line tool to send arbitrary IP packets. It has a
large number of options to specify the content of every header of a
RIP, TCP, UDP, ICMP, or raw IPv4/IPv6 packet. It also allows any data
to be added to the packet. Checksums can be calculated automatically,
but if you wish to send out wrong checksums, that is supported too.  
</P>

<h2><A HREF="http://laurent.riesterer.free.fr/gasp/index.html">http://laurent.riesterer.free.fr/gasp/index.html</A></h2>

<P>
GASP stands for 'Generator and Analyzer System for Protocols'. It
allows you to decode and encode any protocols you specify.  
</P>

<P>
The main use is probably to test networks applications : you can
construct packets by hand and test the behavior of your program when
facing some strange packets. But you can image a lot of other
application : e.g. manipulating graphical file or executable
headers. Just describe the specification of the structured data.  
</P>

<P>
GASP is divided in two parts : a compiler which take the specification
of the protocols and generate the code to handle it, this code is a
new Tcl command as GASP in build upon Tcl/Tk and extends the scripting
facilities provided by Tcl. 
</P>

<h2><A HREF="http://pdump.lucidx.com/">http://pdump.lucidx.com/</A></h2>
<h2><A HREF="http://freshmeat.net/projects/aps/">http://freshmeat.net/projects/aps/</A></h2>
<h2><A HREF="http://freshmeat.net/projects/netsed/">http://freshmeat.net/projects/netsed/</A></h2>
<h2><A HREF="http://www.via.ecp.fr/~bbp/netsh/">http://www.via.ecp.fr/~bbp/netsh/</A></h2>
<h2><A HREF="http://www.elxsi.de/">http://www.elxsi.de/</A></h2>
<h2><A HREF="http://www.laurentconstantin.com/us/lcrzo/">http://www.laurentconstantin.com/us/lcrzo/</A></h2>
<h2><A HREF="http://www.joedog.org/libping/index.html">http://www.joedog.org/libping/index.html</A></h2>
<h2><A HREF="http://feynman.mme.wilkes.edu/projects/xNetTools/">http://feynman.mme.wilkes.edu/projects/xNetTools/</A></h2>
<h2><A HREF="http://freshmeat.net/projects/pktsrc/">http://freshmeat.net/projects/pktsrc/</A></h2>
<h2><A HREF="http://freshmeat.net/projects/lcrzoex/">http://freshmeat.net/projects/lcrzoex/</A></h2>
<h2><A HREF="http://freshmeat.net/projects/rain/">http://freshmeat.net/projects/rain/</A></h2>
<P>
rain is a powerful packet builder for testing the stability of
hardware and software. Its features include support for all IP
protocols and the ability to fully customize the packets it sends.  
</P>

<P>(Note, this is not the same as /usr/games/rain)</P>

<h2><A HREF="http://freshmeat.net/projects/libnet">http://freshmeat.net/projects/libnet</A></h2>
<h2><A HREF="http://freshmeat.net/projects/pftp">http://freshmeat.net/projects/pftp</A></h2>
<h2><A HREF="http://freshmeat.net/projects/pung">http://freshmeat.net/projects/pung</A></h2>

<P>
pung is a simple server tester. It tries to connect via TCP/IP to a
server but does not transfer any data. It is meant to be used in
scripts that check a list of servers, helping to detect certain common
problems.  
</P>

<h2><A HREF="http://freshmeat.net/projects/thesunpacketshell">http://freshmeat.net/projects/thesunpacketshell</A></h2>
<h2><A HREF="http://freshmeat.net/projects/webperformancetrainer">http://freshmeat.net/projects/webperformancetrainer</A></h2>
<h2><A HREF="http://sourceforge.net/projects/va-ctcs">http://sourceforge.net/projects/va-ctcs</A></h2>
<h2><A HREF="http://synscan.nss.nu/programs.php">http://synscan.nss.nu/programs.php</A></h2>
<h2><A HREF="http://sourceforge.net/projects/va-ctcs">http://sourceforge.net/projects/va-ctcs</A></h2>
<h2><A HREF="http://freshmeat.net/projects/ettercap/">http://freshmeat.net/projects/ettercap/</A></h2>
<h2><A HREF="http://www.dtek.chalmers.se/~d3august/xt/index.html">http://www.dtek.chalmers.se/~d3august/xt/index.html</A></h2>
<h2><A HREF="http://www.opersys.com/LTT/">http://www.opersys.com/LTT/</A></h2>
<h2><A HREF="http://packetstorm.securify.com/DoS/indexdate.shtml">http://packetstorm.securify.com/DoS/indexdate.shtml</A></h2>
<H2> <A HREF="http://comnet.technion.ac.il/~cn1w02/">TCP/IP noise simulator</A></H2>