FTester |
|
Description
The Firewall Tester (FTester) is a tool designed for testing firewalls filtering policies and Intrusion Detection System (IDS) capabilities.
The tool consists of two perl scripts, a packet injector (ftest) and the listening sniffer (ftestd). The first script injects custom packets, defined in ftest.conf, with a signature in the data part while the sniffer listens for such marked packets. The scripts both write a log file which is in the same form for both scripts. A diff of the two produced files (ftest.log and ftestd.log) shows the packets that were unable to reach the sniffer due to filtering rules if these two scripts are ran on hosts placed on two different sides of a firewall. Stateful inspection firewalls are handled with the 'connection spoofing' option. A script called freport is also available for automatically parse the log files. Of course this is not an automated process, ftest.conf must be crafted for every different situation. Examples and rules are |
|
Home Page: http://dev.inversepath.com/trac/ftester
|
|
Interface: Command Line
|
Rating: Not Rated (0 votes)
Login or Register to rate FTester, add a Tag, or designate as an alternative to a Windows app |
|
Upload Screenshots
Images must be in GIF, JPG, or PNG formats and can be no larger than 2 MB. Only one file can be uploaded at a time. A description can be included, but it is optional.
|
|
Submit Web Links
Submit the title and link (including https://) to an article pertaining to FTester and it will appear in the Web Links section of the right banner. Contact us here if an entry needs to be removed.
|
Recent comments
4 years 33 weeks ago
5 years 22 weeks ago
5 years 34 weeks ago
5 years 35 weeks ago
5 years 36 weeks ago
5 years 47 weeks ago
6 years 20 weeks ago
6 years 42 weeks ago
6 years 42 weeks ago
6 years 42 weeks ago