GRAY-WORLD.NET TEAM
Contournement inhabituel des firewalls, sécurité des systèmes et réseaux.

It was all very well to say `Drink me,' but the wise little Alice was not going to do that in a hurry. `No, I'll look first,' she said, `and see whether it's marked "poison" or not'; for she had read several nice little histories about children who had got burnt, and eaten up by wild beasts and other unpleasant things, all because they would not remember the simple rules their friends had taught them: such as, that a red-hot poker will burn you if you hold it too long; and that if you cut your finger very deeply with a knife, it usually bleeds; and she had never forgotten that, if you drink much from a bottle marked `poison,' it is almost certain to disagree with you, sooner or later.

Lewis Carroll "Alice In Wonderland"
Alice
English Chinese Russian Spanish Polish Italian
Accueil | Projets | Articles | Forum | Equipe | Liens | Contributions
 Projects 

Another implementation of the M. Zalewski 0trace tool which performs hop enumeration within "established" TCP connections. Trt-Scapy is based on the Scapy tool (http://secdev.org/projects/scapy/) from P. Biondi and performs enumeration for TCP "established" connections and UDP DNS requests streams. Refer to the original http://lcamtuf.coredump.cx/soft/0trace.tgz.

J. for TGW
Current trt-scapy version: 0.0; README
Download | md5sum: 3bde2378d0cd5a0feec45ed6834210bd
http://gray-world.net/projects/trt-scapy/trt-scapy.tgz

Index of projects



Discuss unusual firewall bypassing techniques, network and computer security topics on the our [board].


Team member's sites: blog.0x557.org/icbm/


GNU  GNU General Public License
 GNU Free Documentation License
IRC://irc.0x557.org:3331/gray-world.net
CHANGELOG, MIRRORS, LEGAL NOTICE