Jump to letter: [
9ABCDEFGHIJKLMNOPQRSTUVWXYZ
]
hunt - Tool for demonstrating well known weaknesses in the TCP/IP protocol suite
Hunt is a program for intruding into a connection, watching it and
resetting it. It was inpired by products like Juggernaut or T-sight
but has several features which can not be found in these products.
Note that hunt is operating on Ethernet and is best used for connections
which can be watched through it. However, it is possible to do something
even for hosts on another segments. The hunt doesn't distinguish between
local network connections and connections going to/from Internet. It can
handle all connections it sees.
Connection hijacking is aimed primarily at the telnet traffic but it can
be used for another traffic too. The reset, watching, arp... features
are common to all connections.
Packages
Name |
Version |
Release |
Type |
Size |
Built |
hunt |
1.5 |
5.fc5 |
i386 |
181 KiB |
Sat Feb 18 04:56:12 2006 |
Changelog
- * Sat Feb 18 17:00:00 2006 Enrico Scholz <enrico{*}scholz{%}informatik{*}tu-chemnitz{*}de> - 1.5-5
- removed unneeded curlies
- use commands directly instead of the %__XXX macros
- * Thu May 19 18:00:00 2005 Enrico Scholz <enrico{*}scholz{%}informatik{*}tu-chemnitz{*}de> - 1.5-4
- use %dist instead of %disttag
- * Thu Mar 3 17:00:00 2005 Enrico Scholz <enrico{*}scholz{%}informatik{*}tu-chemnitz{*}de> - 0:1.5-3
- fixed out-of-range array subscript (BZ #149777)
- fixed lots of warnings regarding different signedness
- fixed some minor compilation warnings
- fixed bad handling of hosts-lists when start-host > end-host