The IP Protocol injected, inspected, detected, infected - Part I
Programmers that deal with networks and TCP/IP, sometimes want or need to do
the following nasty things to or with the protocol:
Today we will look at several tools that may be used to do the above, On a
Linux system. Some of these tools are available on other platforms - some not.
- Injecting IP packets into the network.
- Inspecting IP packets flowing through the network.
- Detecting IP packets, doing some automatic analysis to the packets.
- Infecting IP packets, i.e. taking innocent packets and changing them.
Note: we will not cover the topics in the order stated above - it was
there just because of a song...
Originally written by