High Performance Network Sniffer for Packet Inspection

Edit Package netsniff-ng
http://netsniff-ng.org/

netsniff-ng is a high performance Linux network sniffer for packet inspection.
Basically, it is similar to tcpdump, but it doesn't need syscalls for fetching
packets. Instead, it uses an memory mapped area within kernel space for
accessing packets without the need of copying them to userspace ('zero-copy'
mechanism). It can be used for protocol analysis and reverse engineering,
network debugging, measurement of performance throughput, or network statistics
creation of incoming packets on central network nodes like routers or
firewalls.

The netsniff-ng toolkit consists of the following utilities:

* netsniff-ng, a fast zero-copy analyzer, pcap capturing and replaying tool
* trafgen, a multithreaded low-level zero-copy network packet generator
* mausezahn, high-level packet generator for HW/SW appliances with Cisco-CLI
* bpfc, a Berkeley Packet Filter compiler, Linux BPF JIT disassembler
* ifpps, a top-like kernel networking statistics tool
* flowtop, a top-like netfilter connection tracking tool
* curvetun, a lightweight curve25519-based IP tunnel
* astraceroute, an autonomous system (AS) trace route utility

Refresh
Refresh
Source Files
Filename Size Changed
netsniff-ng-0.6.3.tar.xz 0000577752 564 KB
netsniff-ng-fix-ncurses.diff 0000001279 1.25 KB
netsniff-ng.changes 0000005827 5.69 KB
netsniff-ng.spec 0000003361 3.28 KB
Revision 21 (latest revision is 43)
Marcus Meissner's avatar Marcus Meissner (msmeissn) accepted request 487347 from Martin Hauke's avatar Martin Hauke (mnhauke) (revision 21)
- update to 0.6.3
  - Allow to specify packet offsets in trafgen packet header functions.
    By Vadim Kochan.
  - Allow trafgen to send packets from pcap file. By Vadim Kochan.
  - Support trafgen interface without IP address in packet header
    functions. By Ken Wu.
  - Various other improvements and cleanups in the packet header
    functions of trafgen. By Vadim Kochan.
  - Tab based user interface for flowtop. Introduced a tab for flow
    statistics per PID. By Vadim Kochan.
  - Fixed buffer overflow in device_addr2str() causing Linux cooked header
    dissector to crash. Reported by @jamieparfet, fixed by Tobias Klauser.
  - Fixed build due to missing GENL_ID_GENERATE if compiling against
    kernel headers >= 4.10 (see issue #171).
    Reported by Jaroslav Škarvada (@yarda), fixed by Tobias Klauser.
Comments 0
openSUSE Build Service is sponsored by