nemesis v1.8 releases: command-line network packet crafting and injection utility
N E M E S I S – TCP/IP Packet Injection
The Nemesis Project is designed to be a command-line-based, portable human IP stack for UNIX-like and Windows systems. The suite is broken down by protocol and should allow for useful scripting of injected packets from simple shell scripts.
Key Features
- ARP/RARP, DNS, ETHERNET, ICMP, IGMP, IP, OSPF, RIP, TCP, and UDP protocol support
- Layer 2 or Layer 3 injection on UNIX-like systems
- Layer 2 injection (only) on Windows systems
- Packet payload from a file
- IP and TCP options from a file
- Tested on OpenBSD, Linux, Solaris, Mac OS X, and Windows 2000
Each supported protocol uses its own protocol “injector” which is accompanied by a man page explaining its functionality.
Consult the ChangeLog for release details, and the documentation for each protocol injector for in-depth descriptions of the available functionality.
Changelog v1.8
Changes
- Add automatic IP multicast group to MAC multicast address translation
- Improved usability for composing IGMPv3 reports:
- Default to 224.0.0.2 for IGMPv3 report type
- Add
-n NUM
to control the number of group records
Fixes
- Fix IGMP v2 join example in README
- Fix logic for printing DNS protocol: TCP/UDP, by Brett Kuskie
- Fix #12: allow 0.0.0.0 as RIP address
- Fix #13: multiple definitions of variables, by Brett Kuskie
Install
git clone https://github.com/troglobit/inadyn.git
cd inadyn/
./autogen.sh
./configure && make
Usage
Examples
- Inject malformed ICMP redirect
sudo nemesis icmp -S 10.10.10.3 -D 10.10.10.1 -G 10.10.10.3 -i 5
- IGMP v2 join for group 239.186.39.5
sudo nemesis igmp -v -p 22 -S 192.168.1.20 -i 239.186.39.5 -D 239.186.39.5
- IGMP v2 query, max resp. time 10 sec, with Router Alert IP option
echo -ne '\x94\x04\x00\x00' >RA sudo nemesis igmp -v -p 0x11 -c 100 -D 224.0.0.1 -O RA
or
echo -ne '\x94\x04\x00\x00' | sudo nemesis igmp -v -p 0x11 -c 100 -D 224.0.0.1 -O -
- IGMP v3 query, with Router Alert IP option
echo -ne '\x03\x64\x00\x00' > v3 sudo nemesis igmp -p 0x11 -c 100 -i 0.0.0.0 -P v3 -D 224.0.0.1 -O RA
- Random TCP packet
sudo nemesis tcp
- DoS and DDoS testing
sudo nemesis tcp -v -S 192.168.1.1 -D 192.168.2.2 -fSA -y 22 -P foo sudo nemesis udp -v -S 10.11.12.13 -D 10.1.1.2 -x 11111 -y 53 -P bindpkt sudo nemesis icmp redirect -S 10.10.10.3 -D 10.10.10.1 -G 10.10.10.3 -qR sudo nemesis arp -v -d ne0 -H 0:1:2:3:4:5 -S 10.11.30.5 -D 10.10.15.1
Copyright (C) 1999, 2000, 2001 Mark Grimes <mark@stateful.net>
Copyright (C) 2001 – 2005 Jeff Nathan <jeff@snort.org>
All rights reserved.
Source: https://github.com/troglobit/