1
0
mirror of https://git.FreeBSD.org/ports.git synced 2025-01-26 09:46:09 +00:00

Nemesis is a command line, portable "human IP stack". It can be useful for

easy injection of packet streams from simple shell scripts.  It supports
8 protocols (ARP, DNS, ICMP, IGMP, OSPF, RIP, TCP, UDP), and packets can be
injected on either Layer 2 or Layer 3.
This commit is contained in:
David E. O'Brien 2000-07-08 04:24:21 +00:00
parent bf41584064
commit 8e8873a76d
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=30355
6 changed files with 69 additions and 0 deletions

25
net/nemesis/Makefile Normal file
View File

@ -0,0 +1,25 @@
# ex:ts=8
# Ports collection makefile for: nemesis
# Date created: Fri July 07, 2000
# Whom: David O'Brien (obrien@NUXI.com)
#
# $FreeBSD$
#
PORTNAME= nemesis
PORTVERSION= 1.1
CATEGORIES= net security
MASTER_SITES= http://celerity.bartoli.org/nemesis/ \
http://www.packetfactory.net/Projects/nemesis/ \
http://www.nol.net/~halogen/
MAINTAINER= obrien@FreeBSD.org
BUILD_DEPENDS= ${LOCALBASE}/lib/libnet.a::net/libnet
WRKSRC= ${WRKDIR}/${PORTNAME}
GNU_CONFIGURE= yes
MAN1= nemesis-arp.1 nemesis-dns.1 nemesis-icmp.1 nemesis-igmp.1
MAN1+= nemesis-ospf.1 nemesis-rip.1 nemesis-tcp.1 nemesis-udp.1
.include <bsd.port.mk>

1
net/nemesis/distinfo Normal file
View File

@ -0,0 +1 @@
MD5 (nemesis-1.1.tar.gz) = 5c777f73900663f17df8da296aefc4c5

View File

@ -0,0 +1,11 @@
--- configure.orig Fri Jun 23 19:38:00 2000
+++ configure Fri Jul 7 11:46:04 2000
@@ -639,7 +639,7 @@
if test -z "${CFLAGS}"; then
if test -z "${CCOPTS}"; then
- CCOPTS='-O3 -funroll-loops -fomit-frame-pointer -pipe'
+ CCOPTS='-O -funroll-loops -fomit-frame-pointer -pipe'
fi
CFLAGS="$CCOPTS"
fi

1
net/nemesis/pkg-comment Normal file
View File

@ -0,0 +1 @@
Network packet builder & injection suite

22
net/nemesis/pkg-descr Normal file
View File

@ -0,0 +1,22 @@
Nemesis is a command line, portable "human IP stack". It can be useful for
easy injection of packet streams from simple shell scripts. It supports
8 protocols (ARP, DNS, ICMP, IGMP, OSPF, RIP, TCP, UDP), and packets can be
injected on either Layer 2 or Layer 3.
* nemesis-tcp -v -S 192.168.1.1 -D 192.168.2.2 -fS -fA -y 22 -P foo
send TCP packet (SYN/ACK) with payload from ascii file 'foo' to target's
ssh port from 192.168.1.1 to 192.168.2.2. (-v allows a stdout visual of
current injected packet)
* nemesis-icmp -S 10.10.10.3 -D 10.10.10.1 -G 10.10.10.3 -i 5
send ICMP REDIRECT (network) packet from 10.10.10.3 to 10.10.10.1
with preferred gateway as source address.
* nemesis-arp -v -d ne0 -H 0:1:2:3:4:5 -S 10.11.30.5 -D 10.10.15.1
send ARP packet through device 'ne0' from hardware source address
00:01:02:03:04:05 with IP source address 10.11.30.5 to destination IP
address 10.10.15.1 with broadcast destination hardware address.
In other words, who-has the mac address of 10.10.15.1, tell 10.11.30.5
- assuming 00:01:02:03:04:05 is the source mac address of our 'ne0' device.
WWW: http://celerity.bartoli.org/nemesis/

9
net/nemesis/pkg-plist Normal file
View File

@ -0,0 +1,9 @@
@comment $FreeBSD$
sbin/nemesis-arp
sbin/nemesis-dns
sbin/nemesis-icmp
sbin/nemesis-igmp
sbin/nemesis-ospf
sbin/nemesis-rip
sbin/nemesis-tcp
sbin/nemesis-udp