On Fri, Mar 27, 2009 at 9:00 AM, Abhiram Kasina <[email protected]> wrote:
> I am an undergrad student of Indian Institute of Technology Kharagpur. I am > interested in the project "PacketManipulator" Cool! :) > This seems to be a very good idea. I think this could be done using the same > interface as pcap files. Sent and received packets will have different color > settings. And to detect the packets, we could filter using the port, IP > fields in the packets Basically, using libpcap as a background on the low level is good idea. So, yeah PM should support pcap files for sure. > And for live support we need packet sniffing. Am I correct in my > understanding? Yes. Sniffing will be provided by UMPA (and perhaps scapy supports it as well). Most propably is that UMPA will use libpcap for sniffing feature. > Could someone explain me what "Implement attack framework like ettercap" > means? > What attacks should the solution ideally comprise? ettercap is application. here is some introduction from ettercap's website: "Ettercap is a suite for man in the middle attacks on LAN. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis." I think it describes the general idea and no more comments is needed. But if you still feel confused, don't hesitate to ask! Please remember, that ettercap is just an example. bart. ------------------------------------------------------------------------------ _______________________________________________ Umit-devel mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/umit-devel
