GRAY-WORLD.NET TEAM
计算机网络安全技术 不同寻常的网络访问控制系统迂回技术

After a while, finding that nothing more happened, she decided on going into the garden at once; but, alas for poor Alice! when she got to the door, she found she had forgotten the little golden key, and when she went back to the table for it, she found she could not possibly reach it: she could see it quite plainly through the glass, and she tried her best to climb up one of the legs of the table, but it was too slippery; and when she had tired herself out with trying, the poor little thing sat down and cried.

Lewis Carroll "Alice In Wonderland"
Alice
English French Russian Spanish Polish Italian
网站首页 | 开发项目 | 技术论文 | 自由论坛 | 关于我们 | 热门联接 | 赞助支持
 Projects 

Another implementation of the M. Zalewski 0trace tool which performs hop enumeration within "established" TCP connections. Trt-Scapy is based on the Scapy tool (http://secdev.org/projects/scapy/) from P. Biondi and performs enumeration for TCP "established" connections and UDP DNS requests streams. Refer to the original http://lcamtuf.coredump.cx/soft/0trace.tgz.

J. for TGW
Current trt-scapy version: 0.0; README
Download | md5sum: 3bde2378d0cd5a0feec45ed6834210bd
http://gray-world.net/projects/trt-scapy/trt-scapy.tgz

Index of projects



Paper : Exploitation of data streams authorized by a network access control system for arbitrary data transfers : tunneling and covert channels over the HTTP protocol.
[read]


Team member's sites: blog.0x557.org/icbm/


GNU  GNU General Public License
 GNU Free Documentation License
IRC://irc.0x557.org:3331/gray-world.net
CHANGELOG, MIRRORS, LEGAL NOTICE