[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#626602: RFA: dsniff -- Various tools to sniff network traffic for cleartext insecurities



Package: wnpp
Severity: normal

I request an adopter for the dsniff package.


The package description is:
Description: Various tools to sniff network traffic for cleartext insecurities
 This package contains several tools to listen to and create network traffic:
 .
  * arpspoof  - Send out unrequested (and possibly forged) arp replies.
  * dnsspoof  - forge replies to arbitrary DNS address / pointer queries
              on the Local Area Network.
  * dsniff    - password sniffer for several protocols.
  * filesnarf - saves selected files sniffed from NFS traffic.
  * macof     - flood the local network with random MAC addresses.
  * mailsnarf - sniffs mail on the LAN and stores it in mbox format.
  * msgsnarf  - record selected messages from different Instant Messengers.
  * sshmitm   - SSH monkey-in-the-middle. proxies and sniffs SSH traffic.
  * sshow     - SSH traffic analyser.
  * tcpkill   - kills specified in-progress TCP connections.
  * tcpnice   - slow down specified TCP connections via "active"
              traffic shaping.
  * urlsnarf  - output selected URLs sniffed from HTTP traffic in CLF.
  * webmitm   - HTTP / HTTPS monkey-in-the-middle. transparently proxies.
  * webspy    - sends URLs sniffed from a client to your local browser
              (requires libx11-6 installed).

It's mostly abandoned by upstream, who is migrating the code to python[1] (the 
current python version doesn't covert the dsniff feature list and it's 
abandonish).

luciano

[1] https://code.google.com/p/dsniff/

Attachment: signature.asc
Description: This is a digitally signed message part.


Reply to: