5 lines
325 B
Text
5 lines
325 B
Text
Purpose: To use intrusion fingerprints to track down compromised hosts.
|
|
Scope: TCP/UDP/ICMP (No fragmentation reassembly)
|
|
Specs: Program can create somewhat arbitrary UDP/ICMP/TCP packets/streams
|
|
and send them to a range of hosts. It also listens promiscuously
|
|
for predefined intrusion "fingerprints".
|