This dataset is no longer available and has a current status of
'Withdrawn'.
Please see the catalog for a listing of currently available datasets.
Please see the catalog for a listing of currently available datasets.
This is a non-IMPACT record, meaning that access to the data is not
controlled by IMPACT. For access, see the directions below.
Disclaimer:
This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.
Disclaimer:
This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.
Summary
DS-1204
nemesis
External Tool
External Data Source
GitHub
Unknown
Unknown
56 (lowest rank is 56)
Description
A command-line network packet crafting and injection utility
The Nemesis Project is designed to be a command line based, portable human IP stack for UNIX-like and Windows systems. The suite is broken down by protocol, and should allow for useful scripting of injected packets from simple shell scripts.
Key Features
ARP/RARP, DNS, ETHERNET, ICMP, IGMP, IP, OSPF, RIP, TCP and UDP protocol support
Layer 2 or Layer 3 injection on UNIX-like systems
Layer 2 injection (only) on Windows systems
Packet payload from file
IP and TCP options from file
Tested on OpenBSD, Linux, Solaris, Mac OS X and Windows 2000
Each supported protocol uses its own protocol injector which is accompanied by a man page explaining its functionality.
Consult the ChangeLog for release details, and the documentation for each protocol injector for in-depth descriptions of the available functionality.
Examples
Inject malformed ICMP redirec
DHCP Discover (must use sudo and to send with source IP 0.0.0.0):
IGMP v2 join for group 239.186.39.5
IGMP v2 query, max resp. time 10 sec, with Router Alert IP option
IGMP v3 query, with Router Alert IP option
Random TCP packet
DoS and DDoS testing
Additional Details
607B
false
Unknown
nemesis, 1204, source, inferlink, corporation, inferlink corporation, external, external data source, packet, injection, command, network, utility, crafting, protocol, igmp, tcp, layer, systems, windows, v2, injector, icmp, option, query, router, file, alert, unix, functionality, scripting, random, scripts, sudo, consult, linux, mac, designed, inject, time, depth, suite, supported, 186, ospf, resp, max, os, broken, dhcp, arp, key, solaris, human, v3, malformed, based, openbsd, join, details, 239, options, rip, rarp, injected, payload, packets, descriptions, redirec, simple, project, release, tested, discover, documentation, ddos, dos, other, udp, features, send, support, explaining, shell, examples, accompanied, ethernet, portable, changelog, 2000, dns, testing, stack