/usr/share/doc/netwox-doc/tools/40.html is in netwox-doc 5.39.0-1.2.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 | <HTML>
<HEAD>
<TITLE>Tool 40: Spoof Ip4Tcp packet</TITLE>
</HEAD>
<BODY BGCOLOR="#FFFFFF">
<CENTER> <H3>Tool 40: Spoof Ip4Tcp packet</H3>
</CENTER>
<P><H3>Description:</H3>
<PRE>
This tool sends a fake packet on the network.
Each parameter name should be self explaining.
Parameter --spoofip indicates how to generate link layer for spoofing.
Values 'best', 'link' or 'raw' are common choices for --spoofip. Here
is the list of accepted values:
- 'raw' means to spoof at IP4/IP6 level (it uses system IP stack). If
a firewall is installed, or on some systems, this might not work.
- 'linkf' means to spoof at link level (currently, only Ethernet is
supported). The 'f' means to Fill source Ethernet address.
However, if source IP address is spoofed, it might be impossible
to Fill it. So, linkf will not work: use linkb or linkfb instead.
- 'linkb' means to spoof at link level. The 'b' means to left a Blank
source Ethernet address (0:0:0:0:0:0, do not try to Fill it).
- 'linkfb' means to spoof at link level. The 'f' means to try to Fill
source Ethernet address, but if it is not possible, it is left
Blank.
- 'rawlinkf' means to try 'raw', then try 'linkf'
- 'rawlinkb' means to try 'raw', then try 'linkb'
- 'rawlinkfb' means to try 'raw', then try 'linkfb'
- 'linkfraw' means to try 'linkf', then try 'raw'
- 'linkbraw' means to try 'linkb', then try 'raw'
- 'linkfbraw' means to try 'linkfb', then try 'raw'
- 'link' is an alias for 'linkfb'
- 'rawlink' is an alias for 'rawlinkfb'
- 'linkraw' is an alias for 'linkfbraw'
- 'best' is an alias for 'linkraw'. It should work in all cases.
This tool may need to be run with admin privilege in order to spoof.
</PRE>
<P><H3>Synonyms:</H3>
hping, send<BR>
<P><H3>Usage:</H3>
netwox 40 [-c uint32] [-e uint32] [-f|+f] [-g|+g] [-h|+h] [-i uint32] [-j uint32] [-k uint32] [-l ip] [-m ip] [-n ip4opts] [-o port] [-p port] [-q uint32] [-r uint32] [-s|+s] [-t|+t] [-u|+u] [-v|+v] [-w|+w] [-x|+x] [-y|+y] [-z|+z] [-A|+A] [-B|+B] [-C|+C] [-D|+D] [-E uint32] [-F uint32] [-G tcpopts] [-H mixed_data] [-a spoofip] [-J uint32] [-K uint32] [-L uint32] [-M uint32] [-N uint32]<BR>
<P><H3>Parameters:</H3>
<TABLE BORDER=1 CELLPADDING=4>
<TR>
<TD ALIGN=middle><I>parameter</I></TD>
<TD ALIGN=middle><I>description</I></TD>
<TD ALIGN=middle><I>example</I></TD>
</TR>
<TR><TD><TT>-c|--ip4-tos uint32</TD>
<TD>IP4 tos</TD>
<TD>0</TD></TR>
<TR><TD><TT>-e|--ip4-id uint32</TD>
<TD>IP4 id (rand if unset)</TD>
<TD>0</TD></TR>
<TR><TD><TT>-f|--ip4-reserved|+f|--no-ip4-reserved</TD>
<TD>IP4 reserved</TD>
<TD> </TD></TR>
<TR><TD><TT>-g|--ip4-dontfrag|+g|--no-ip4-dontfrag</TD>
<TD>IP4 dontfrag</TD>
<TD> </TD></TR>
<TR><TD><TT>-h|--ip4-morefrag|+h|--no-ip4-morefrag</TD>
<TD>IP4 morefrag</TD>
<TD> </TD></TR>
<TR><TD><TT>-i|--ip4-offsetfrag uint32</TD>
<TD>IP4 offsetfrag</TD>
<TD>0</TD></TR>
<TR><TD><TT>-j|--ip4-ttl uint32</TD>
<TD>IP4 ttl</TD>
<TD>0</TD></TR>
<TR><TD><TT>-k|--ip4-protocol uint32</TD>
<TD>IP4 protocol</TD>
<TD>0</TD></TR>
<TR><TD><TT>-l|--ip4-src ip</TD>
<TD>IP4 src</TD>
<TD>192.168.100.200</TD></TR>
<TR><TD><TT>-m|--ip4-dst ip</TD>
<TD>IP4 dst</TD>
<TD>5.6.7.8</TD></TR>
<TR><TD><TT>-n|--ip4-opt ip4opts</TD>
<TD>IPv4 options</TD>
<TD> </TD></TR>
<TR><TD><TT>-o|--tcp-src port</TD>
<TD>TCP src</TD>
<TD>1234</TD></TR>
<TR><TD><TT>-p|--tcp-dst port</TD>
<TD>TCP dst</TD>
<TD>80</TD></TR>
<TR><TD><TT>-q|--tcp-seqnum uint32</TD>
<TD>TCP seqnum (rand if unset)</TD>
<TD>0</TD></TR>
<TR><TD><TT>-r|--tcp-acknum uint32</TD>
<TD>TCP acknum</TD>
<TD>0</TD></TR>
<TR><TD><TT>-s|--tcp-reserved1|+s|--no-tcp-reserved1</TD>
<TD>TCP reserved1</TD>
<TD> </TD></TR>
<TR><TD><TT>-t|--tcp-reserved2|+t|--no-tcp-reserved2</TD>
<TD>TCP reserved2</TD>
<TD> </TD></TR>
<TR><TD><TT>-u|--tcp-reserved3|+u|--no-tcp-reserved3</TD>
<TD>TCP reserved3</TD>
<TD> </TD></TR>
<TR><TD><TT>-v|--tcp-reserved4|+v|--no-tcp-reserved4</TD>
<TD>TCP reserved4</TD>
<TD> </TD></TR>
<TR><TD><TT>-w|--tcp-cwr|+w|--no-tcp-cwr</TD>
<TD>TCP cwr</TD>
<TD> </TD></TR>
<TR><TD><TT>-x|--tcp-ece|+x|--no-tcp-ece</TD>
<TD>TCP ece</TD>
<TD> </TD></TR>
<TR><TD><TT>-y|--tcp-urg|+y|--no-tcp-urg</TD>
<TD>TCP urg</TD>
<TD> </TD></TR>
<TR><TD><TT>-z|--tcp-ack|+z|--no-tcp-ack</TD>
<TD>TCP ack</TD>
<TD> </TD></TR>
<TR><TD><TT>-A|--tcp-psh|+A|--no-tcp-psh</TD>
<TD>TCP psh</TD>
<TD> </TD></TR>
<TR><TD><TT>-B|--tcp-rst|+B|--no-tcp-rst</TD>
<TD>TCP rst</TD>
<TD> </TD></TR>
<TR><TD><TT>-C|--tcp-syn|+C|--no-tcp-syn</TD>
<TD>TCP syn</TD>
<TD> </TD></TR>
<TR><TD><TT>-D|--tcp-fin|+D|--no-tcp-fin</TD>
<TD>TCP fin</TD>
<TD> </TD></TR>
<TR><TD><TT>-E|--tcp-window uint32</TD>
<TD>TCP window</TD>
<TD>0</TD></TR>
<TR><TD><TT>-F|--tcp-urgptr uint32</TD>
<TD>TCP urgptr</TD>
<TD>0</TD></TR>
<TR><TD><TT>-G|--tcp-opt tcpopts</TD>
<TD>TCP options</TD>
<TD> </TD></TR>
<TR><TD><TT>-H|--tcp-data mixed_data</TD>
<TD>mixed data</TD>
<TD> </TD></TR>
<TR><TD><TT>-a|--spoofip spoofip</TD>
<TD>IP spoof initialization type</TD>
<TD>best</TD></TR>
<TR><TD><TT>-J|--ip4-ihl uint32</TD>
<TD>IP4 ihl</TD>
<TD>5</TD></TR>
<TR><TD><TT>-K|--ip4-totlen uint32</TD>
<TD>IP4 totlen</TD>
<TD>0</TD></TR>
<TR><TD><TT>-L|--ip4-checksum uint32</TD>
<TD>IP4 checksum</TD>
<TD>0</TD></TR>
<TR><TD><TT>-M|--tcp-doff uint32</TD>
<TD>TCP data offset</TD>
<TD>0</TD></TR>
<TR><TD><TT>-N|--tcp-checksum uint32</TD>
<TD>TCP checksum</TD>
<TD>0 </TD></TR>
</TABLE>
<P><H3>Example:</H3>
netwox 40<BR>
<BR>
</BODY>
</HTML>
|