-
Notifications
You must be signed in to change notification settings - Fork 23
Calling the attack
Jens Keim edited this page Apr 15, 2019
·
1 revision
To inject a Membership Management Communication Attack, call ID2T e.g. like so:
./id2t -i input_file -a MembersMgmtCommAttack [parameters]
If desired, a seed for the randomization used within the program can be specified e.g. like so:
./id2t -i input_file --seed 42 -a MembersMgmtCommAttack [parameters]
The seed can also be a string:
./id2t -i input_file --seed "Hello World" -a MembersMgmtCommAttack [parameters]
It is also possible to inject into an empty PCAP file, using the statistics of the input PCAP. The required flag is -ie or --inject_empty
./id2t -i input_file -ie -a MembersMgmtCommAttack [parameters]
./id2t -i input_file --inject_empty -a MembersMgmtCommAttack [parameters]
Another new feature is that one can specify the (base) name of the output file(s). If the specified name has a different extension than .pcap
, the base name includes the given extension. For example when calling:
./id2t -i input_file -o output_file.pcap -a MembersMgmtCommAttack [parameters]
./id2t -i input_file -o output_file -a MembersMgmtCommAttack [parameters]
The output PCAP is called output_file.pcap
.
But if one calls ID2T like this:
./id2t -i input_file --output output_file.jpg -a MembersMgmtCommAttack [parameters]
The output PCAP is called output_file.jpg.pcap
.