This dataset is no longer available and has a current status of 'Withdrawn'.
Please see the catalog for a listing of currently available datasets.
This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

Disclaimer:
This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.

Summary

DS-1203
libcrafter
External Tool
External Data Source
GitHub
Unknown
Unknown
55 (lowest rank is 55)

Category & Restrictions

Other
network data
Unrestricted
true

Description


A high level C++ network packet sniffing and crafting library.

Libcrafter is a high level library for C++ designed to create and decode network packets. It is able to craft or decode packets of most common networks protocols, send them on the wire, capture them and match requests and replies. It enables the creation of networking tools in a few lines with a interface very similar to Scapy. A packet is described as layers that you stack one upon the other. Fields of each layer have useful default values that you can overload. The library is designed to be used in multithreaded programs where you can combine several tasks simultaneously. For example, you can easily design something that sniffs, mangles, and sends at the same time you are doing an ARP-Spoofing attack. It also contains a very naive implementation of the TCP/IP stack (fragmentation is no handled yet) at user level that enables working with TCP streams. This facilitates the creation of tools for data injection on arbitrary connections, IP spoofing and TCP/IP session hijacking.

Additional Details

3.0KB
false
Unknown
visualization, web security exploits, network analyzers, statistical classification, information technology governance, subroutine, power supplies, packet analyzer, packets, naive bayes classifier, external data source, hacking, history of the internet, deception, session hijacking, internet protocol, scapy, ip fragmentation, spoofing attack, internet service provider, network packet, power supply, classification algorithms, ip address spoofing, graphical user interface, injection exploits, source code, code injection, inferlink corporation, internet security, network architecture, user interface, libcrafter, 1203, arp spoofing, exploit, internet access