Stegtunnel is a tool written to hide data within TCP/IP header fields. It was designed to be undetectable, even by people familiar with the tool. It can hide the data underneath real TCP connections, using real, unmodified clients and servers to provide the TCP conversation. In this way, detection of odd-looking sessions is avoided. It provides covert channels in the sequence numbers and IPIDs of TCP connections.
11966b466a58cdf47871a9d251dd8d6cc2391268979f455414922b1a72b8a13d
Stegtunnel is a tool written to hide data within TCP/IP header fields. It was designed to be undetectable, even by people familiar with the tool. It can hide the data underneath real TCP connections, using real, unmodified clients and servers to provide the TCP conversation. In this way, detection of odd-looking sessions is avoided. It provides covert channels in the sequence numbers and IPIDs of TCP connections.
ebef4d7fb76c4d35e30fe24a2260a12237b058adad112fa1c746f7a0277b289c
Lsrscan scans remote hosts to determine if the will reverse source routed connections, and hence are vulnerable to spoofing attacks.
e473245de3168fc20e84469cfeb7c04222d6d37c5527679ee5d4b2532580828b
lsrtunnel spoofs connections to a remote host by pretending to be the middle host in a source routed path. The remote host must return source routed connections for this spoofing to work.
f93e7c951f6c48c76504b0e670c181ace1f06b89a1ec655e200edfae795a5a3b
lsrscan is a scanner to determine whether remote hosts will return source routed connections, or forward source routed packets to a remote host.
0cb60ffa7d1adf18ad526999957b9cfc557cbba3f64b1911e181a2ee86baac7f