products
downloads
devel
docs
Support

  Development
 
    Libraries  

 

  OxYD (Visual C++)
  OxYD (Delphi)
  LibnetNT (by SecurityBugware.org)
 
 
  OxYD (Visual C++) - By G. Wilmes

OxYD Socket uses Internet Explorer to send and receive data through firewalls like Zonealarm. The library is provided as a class and a sample testing program is available also.

OxYD Socket testing application screenshot :

 
 
  OxYD (Delphi) - By U. Kistler
OxYD Socket uses Internet Explorer to send and receive data through firewalls like Zonealarm. The library is provided as a class and a sample testing program is available also.
TOxYDSocket is a port of COxYDSocket to Delphi (6,7) and does exactly the same as COxYDSocket.
 
 
  LibnetNT - By SecurityBugware.org

LibnetNT is the Windows port of Libnet. We provide the latest version only, which is also required by Nemesis Win32 for example.

 
 

 

    Ports  

 

  Nemesis Win32
 
 
  Nemesis Win32 port - By G. Wilmes
nemesis-win32 is a command-line Windows network packet injection suite. Originally written by obecian (Mark Grimes), nemesis has grown to be an extremely popular tool suite.

Nemesis-win32 v1.32 (13/02/2003 - 96 K)

Readme_win32.txt

nemesis-tcp.txt

nemesis-udp.txt

nemesis-icmp.txt

nemesis-arp.txt

nemesis-igmp.txt

nemesis-dns.txt

nemesis-rip.txt

nemesis-ospf.txt

original UNIX version: nemesis-1.32.tar.gz (CHANGELOG) (CHECKSUM) [Jun 22 2001] supported protocols: TCP, UDP, ICMP, ARP/RARP, IGMP, DNS, RIP, and OSPF
supported platforms: Windows versions supported by libnetNT This program requires: Command line additions for Windows port:
-d <Ethernet Device>
* list : to list available interfaces
* 0 : to select interface from the list
* 1+ (1, 2, 3...) : to select interface from its number
A few examples:
  • nemesis-tcp -v -S 192.168.1.1 -D 192.168.2.2 -fS -fA -y 22 -P foo Send TCP packet (SYN/ACK) with payload from ascii file 'foo' to target's ssh port from 192.168.1.1 to 192.168.2.2. (-v allows a stdout visual of current injected packet)
  • nemesis-udp -v -S 10.11.12.13 -D 10.1.1.2 -x 11111 -y 53 -P bindpkt send UDP packet from 10.11.12.13:11111 to 10.1.1.2's name-service port with a payload read from a file 'bindpkt'. (again -v is used in order to see confirmation of our injected packet)
  • nemesis-icmp -S 10.10.10.3 -D 10.10.10.1 -G 10.10.10.3 -i 5 send ICMP REDIRECT (network) packet from 10.10.10.3 to 10.10.10.1 with preferred gateway as source address. Here we want no output to go to stdout - which would be ideal as a component in a batch job via a shell script.
  • nemesis-arp -v -d 1 -H 0:1:2:3:4:5 -S 10.11.30.5 -D 10.10.15.1 send ARP packet through device n°1 from hardware source address 00:01:02:03:04:05 with IP source address 10.11.30.5 to destination IP address 10.10.15.1 with broadcast destination hardware address. In other words, who-has the mac address of 10.10.15.1, tell 10.11.30.5 - assuming 00:01:02:03:04:05 is the source mac address of our first device.

Nemesis homepage

 

 

Copyright 2003-2007 by Engage Security
top