Ipsectrace: Difference between revisions
No edit summary |
No edit summary |
||
Line 2: | Line 2: | ||
{{Db-a1}} |
{{Db-a1}} |
||
ipsectrace is a software tool designed to help profile [[ipsec]] connections in a [[PCP|packet capture]] file. The program uses a command line interface to point at a |
ipsectrace is a software tool designed by Wayne Schroeder to help profile [[ipsec]] connections in a [[PCP|packet capture]] file. The program uses a command line interface to point at a PCP capture and informs the user about what is going on. It is somewhat inspired by [[tcptrace]], which uses the same input of PCP files.<ref name=tcptrace>{{cite web|title=tcptrace|url=http://www.tcptrace.org/|accessdate=9 May 2011}}</ref> Ipsectrace is only available for the [[Linux]] [[operating system]]. It was coded in [[C++]] and is licensed under the [[GPL]], effectively allowing anyone to modify and redistribute it.<ref name=GPL>{{cite web|title=Frequently Asked Questions about the GNU Licenses|url=http://www.gnu.org/licenses/gpl-faq.html#WhyDoesTheGPLPermitUsersToPublishTheirModifiedVersions|publisher=GNU|accessdate=9 May 2011}}</ref> |
||
Although its main purpose is to monitor ipsec traffic, ipsectrace can be used to crack extra layers of security brought about by [[VPN]] implementations of security such as ipsec and [[SSH]], whereas programs such as Anger, Deceit, and [[Ettercap]] can be used to infiltrate PPTP security.<ref name=Beaver>{{cite book|last=Beaver|first=Kevin|title=Hacking wireless networks for dummies : [find and fix network loopholes before invaders exploit them]|year=2005|publisher=Wiley|location=Hoboken, NJ|isbn=0764597302|url=http://books.google.com/books?id=i0Edxmcly1oC&pg=PA295&lpg=PA295&dq=deceit+pptp&source=bl&ots=nY2yJjStHU&sig=mYiCPZWaSzgY6L9e4m6CzZFP-Y8#v=onepage&q=deceit%20pptp&f=false|edition=1st ed.|coauthors=Akin, Peter T. Davis. Foreword by Devin K.}}</ref> |
Although its main purpose is to monitor ipsec traffic, ipsectrace can be used to crack extra layers of security brought about by [[VPN]] implementations of security such as ipsec and [[SSH]], whereas programs such as Anger, Deceit, and [[Ettercap]] can be used to infiltrate [[PPTP]] security.<ref name=Beaver>{{cite book|last=Beaver|first=Kevin|title=Hacking wireless networks for dummies : [find and fix network loopholes before invaders exploit them]|year=2005|publisher=Wiley|location=Hoboken, NJ|isbn=0764597302|url=http://books.google.com/books?id=i0Edxmcly1oC&pg=PA295&lpg=PA295&dq=deceit+pptp&source=bl&ots=nY2yJjStHU&sig=mYiCPZWaSzgY6L9e4m6CzZFP-Y8#v=onepage&q=deceit%20pptp&f=false|edition=1st ed.|coauthors=Akin, Peter T. Davis. Foreword by Devin K.}}</ref> |
||
==References== |
==References== |
Revision as of 04:52, 9 May 2011
This is an article recently created by a new user at Louisiana State University for a class project. More editing may be needed to meet standards, but please be courteous and assume good faith, and consider leaving a constructive message on the creator's talk page if large changes need to be made. This template should be removed once the page has been reviewed by someone other than its creator. If you are the article's creator, you can seek feedback on your new article. (May 2011) |
This article may meet Wikipedia's criteria for speedy deletion as a very short article lacking sufficient context to identify the subject of the article. See CSD A1.
If this article does not meet the criteria for speedy deletion, or you intend to fix it, please remove this notice, but do not remove this notice from pages that you have created yourself. If you created this page and you disagree with the given reason for deletion, you can click the button below and leave a message explaining why you believe it should not be deleted. You can also visit the talk page to check if you have received a response to your message. Note that this article may be deleted at any time if it unquestionably meets the speedy deletion criteria, or if an explanation posted to the talk page is found to be insufficient.
Note to administrators: this article has content on its talk page which should be checked before deletion. Administrators: check links, talk, history (last), and logs before deletion. Consider checking Google.This page was last edited by Squishy Crayons (contribs | logs) at 04:52, 9 May 2011 (UTC) (13 years ago) |
ipsectrace is a software tool designed by Wayne Schroeder to help profile ipsec connections in a packet capture file. The program uses a command line interface to point at a PCP capture and informs the user about what is going on. It is somewhat inspired by tcptrace, which uses the same input of PCP files.[1] Ipsectrace is only available for the Linux operating system. It was coded in C++ and is licensed under the GPL, effectively allowing anyone to modify and redistribute it.[2]
Although its main purpose is to monitor ipsec traffic, ipsectrace can be used to crack extra layers of security brought about by VPN implementations of security such as ipsec and SSH, whereas programs such as Anger, Deceit, and Ettercap can be used to infiltrate PPTP security.[3]
References
- ^ "tcptrace". Retrieved 9 May 2011.
- ^ "Frequently Asked Questions about the GNU Licenses". GNU. Retrieved 9 May 2011.
- ^ Beaver, Kevin (2005). Hacking wireless networks for dummies : [find and fix network loopholes before invaders exploit them] (1st ed. ed.). Hoboken, NJ: Wiley. ISBN 0764597302.
{{cite book}}
:|edition=
has extra text (help); Unknown parameter|coauthors=
ignored (|author=
suggested) (help)
External Links
ipsectrace download at OStatic