List of (for me) useful network tools and a few scripts to set them up.
|
hace 1 mes | |
---|---|---|
.woodpecker | hace 1 año | |
images | hace 1 año | |
scripts | hace 3 meses | |
.gitignore | hace 1 año | |
.shellcheckrc | hace 1 año | |
LICENSE | hace 1 año | |
README.md | hace 2 meses | |
android.md | hace 3 meses | |
ascii-art.md | hace 1 mes |
_________
_--^^ __ ^^^-_
_-^^ - - ^^-_
_- +^ ^- ^_
- +^ ^- ^_
_^ ---- ---- +
+ | | |
- _ | | _ |
| |^- | | _^ | -
- ________| ^- -^ |_______ |
| | ^- ^ | |
| |_______ -^ ^- _______| |
| | _^ ____ ^- | +
- |-^ | | ^-_| +
+ | | +
+ ____| |____ +
+ | | +
^+ ^-_ -^ +^
^-_ ^_ -^ _+^
^-_ ^--^ _-+
^+--______--++^^
The following instructions can be used to install the programs listed above:
sudo apt-get install mtr iputils-tracepath iputils-ping iputils-clockdiff iputils-arping traceroute socat nmap nmap-common ncat netcat-openbsd tcpdump bind9-dnsutils dnsdiag ldns scamper curl wget openssh-client wireshark tshark iftop termshark iperf3 fping
sudo apt-get install python3-scapy python3-matplotlib python3-pyx python3-cryptography ipython3 graphviz imagemagick sox
sudo pacman --sync --needed mtr iputils traceroute socat nmap openbsd-netcat tcpdump bind curl wget openssh iftop wireshark-cli wireshark-qt termshark iperf3 fping
sudo pacman --sync --needed scapy python-matplotlib python-pyx python-cryptography ipython graphviz imagemagick sox
scamper
from AURdnsdiag
from AURtcping-go
from AURsudo apk add mtr mtr-gtk iputils traceroute socat socat-scripts nmap nmap-ncat nmap-nping nmap-scripts netcat-openbsd tcpdump bind-tools ldnsutils curl wget openssh wireshark tshark iftop termshark iperf3 fping
sudo apk add mtr-doc traceroute-doc socat-doc nmap-doc netcat-openbsd-doc tcpdump-doc bind-doc curl-doc wget-doc openssh-doc wireshark-doc iftop-doc fping-doc
sudo apk add scapy scapy-doc py3-matplotlib py3-cryptography ipython graphviz imagemagick sox
doas pkg install mtr socat nmap tcpdump bind-tools ldns scamper curl wget wireshark termshark iftop iperf3 fping
doas pkg install py311-scapy py311-pyx py311-ipython
pkg install tracepath traceroute socat nmap netcat-openbsd dnsutils ldns wget openssh iperf3
pkg install mtr tcpdump tshark termshark
pkg install wireshark-qt
Alternatively, you can use the script ./scripts/install_tools.sh
, which tries to automatically detect the package manager and install the programs.
Some programs (nmap, nping traceroute or scapy) require the capability to open raw sockets in order to be able to use all functions.
This can be set with the command setcap cap_net_raw+ep /path/to/program
.
Alternatively, the script ./scripts/set_capabilties.sh
tries to set the capabilities automatically.
Scamper enters a chroot at startup. For this to be possible, the program must be executed as root. To enable normal users to run scamper anyway, the setuid bit can be set, which means that anyone can run scamper as root (or as the owner of scamper, which is root).
To set the setuid-bit automatically, the script ./scripts/scamper_setuid.sh
can be used.
I find some aliases useful for some programs:
-p 33434
can be set. This is useful, for example, if firewalls only allow the ports of traceroute accordingly.--privileged
parameter.To have these aliases set automatically in the .bashrc
file, the ./scripts/set_bash_aliases.sh
script can be used.