Jump to letter: [
ABCDEFGHIJKLMNOPQRSTUVWXYZ
]
hunt: Tool for demonstrating well known weaknesses in the TCP/IP protocol suite
- Summary
- Hunt is a program for intruding into a connection, watching it and
resetting it. It was inpired by products like Juggernaut or T-sight
but has several features which can not be found in these products.
Note that hunt is operating on Ethernet and is best used for connections
which can be watched through it. However, it is possible to do something
even for hosts on another segments. The hunt doesn't distinguish between
local network connections and connections going to/from Internet. It can
handle all connections it sees.
Connection hijacking is aimed primarily at the telnet traffic but it can
be used for another traffic too. The reset, watching, arp... features
are common to all connections.
Changelog
- * Thu May 19 17:00:00 2005 Enrico Scholz <enrico{*}scholz{%}informatik{*}tu-chemnitz{*}de> - 1.5-4
- use %dist instead of %disttag
- * Thu Mar 3 16:00:00 2005 Enrico Scholz <enrico{*}scholz{%}informatik{*}tu-chemnitz{*}de> - 0:1.5-3
- fixed out-of-range array subscript (BZ #149777)
- fixed lots of warnings regarding different signedness
- fixed some minor compilation warnings
- fixed bad handling of hosts-lists when start-host > end-host
- * Fri May 9 17:00:00 2003 Enrico Scholz <enrico{*}scholz{%}informatik{*}tu-chemnitz{*}de> 0:1.5-0.fdr.2
- updated source-url