Applications/Internet

hunt - Tool for demonstrating well known weaknesses in the TCP/IP protocol suite

Hunt is a program for intruding into a connection, watching it and
resetting it. It was inpired by products like Juggernaut or T-sight
but has several features which can not be found in these products.

Note that hunt is operating on Ethernet and is best used for connections
which can be watched through it. However, it is possible to do something
even for hosts on another segments. The hunt doesn't distinguish between
local network connections and connections going to/from Internet. It can
handle all connections it sees.

Connection hijacking is aimed primarily at the telnet traffic but it can
be used for another traffic too.  The reset, watching, arp... features
are common to all connections.
License:GPL Group:Applications/Internet
URL:http://lin.fsid.cvut.cz/~kra/index.html Source: hunt

Packages

Name Version Release Type Size Built
hunt 1.5 4.fc3 i386 165 KiB Thu May 19 22:48:32 2005

Changelog

* Thu May 19 18:00:00 2005 Enrico Scholz <enrico{*}scholz{%}informatik{*}tu-chemnitz{*}de> - 1.5-4
- use %dist instead of %disttag
* Thu Mar 3 17:00:00 2005 Enrico Scholz <enrico{*}scholz{%}informatik{*}tu-chemnitz{*}de> - 0:1.5-3
- fixed out-of-range array subscript (BZ #149777)
- fixed lots of warnings regarding different signedness
- fixed some minor compilation warnings
- fixed bad handling of hosts-lists when start-host > end-host
* Fri May 9 18:00:00 2003 Enrico Scholz <enrico{*}scholz{%}informatik{*}tu-chemnitz{*}de> 0:1.5-0.fdr.2
- updated source-url

Listing created by RepoView-0.5.2-1.fc6 (modified)