is a simple test program for the library. It can be used to compose and transmit network datagrams as a Unix-style filter (e.g. reading from or writing to files and pipes) or modify the local system network configuration (including the ARP cache, firewall ruleset, network interfaces, and routing table). Convert the (specified as a hostname, IP address, or MAC address) into its binary representation on standard output. Convert the C-style escaped (shellcode, for instance) into its binary representation on standard output. Write random bytes to standard output. Prepend the data read from standard input with an Ethernet header on standard output. The Ethernet may be specified as or as a hex, octal, or decimal number. Prepend the data read from standard input with an ARP header on standard output. The ARP may be specified as or as a hex, octal, or decimal number. Prepend the data read from standard input with an IP header on standard output. The fragmentation may be specified as a decimal number (optionally concatenated with to indicate more fragments) or as a hex number. The may be specified by name, or as a hex, octal, or decimal number. Prepend the data read from standard input with an ICMP header on standard output. Prepend the data read from standard input with a TCP header on standard output. A may be specified by name or hex, octal, or decimal number. The TCP may be specified as some combination of the characters in the set or as a hex number. Prepend the data read from standard input with a UDP header on standard output. A may be specified by name or hex, octal, or decimal number. Read a packet from standard input and send it over the network. If no is specified, the packet is assumed to be an IP datagram and routed to its destination. Otherwise, the packet is assumed to be an Ethernet frame and is transmitted on the specified interface. Display the kernel ARP cache. Display the kernel ARP entry for Add an ARP entry mapping the address for Delete the ARP entry for Display the kernel firewall ruleset. Add a rule to or delete a rule from the active firewall ruleset. The must be either or The direction must be either or The may specify an interface name, or The may be specified by name, or as a decimal number. For TCP and UDP protocols, a (or range, if specified with a value) may be specified in decimal and appended to the source and/or destination address. For ICMP, a (and optional may be specified in decimal. Display the configuration of all network interfaces. Display the configuration for the interface specified by Configure the interface specified by Display the kernel routing table. Display the route for the destination specified as a hostname, IP address, or network prefix in CIDR notation. Add a route for the destination through the gateway Delete the route for the destination Send a UDP datagram containing random shellcode: dnet hex "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89" \ "\x46\x0c\xb0\x0b\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80" \ "\x31\xdb\x89\xd8\x40\xcd\x80\xe8\xdc\xff\xff\xff/bin/sh" | \ dnet udp sport 555 dport 666 | \ dnet ip proto udp src 1.2.3.4 dst 5.6.7.8 | dnet send Save an ARP request in a file and send it twice: dnet arp op req sha 0:d:e:a:d:0 spa 10.0.0.3 tpa 10.0.0.4 | \ dnet eth type arp src 0:d:e:a:d:0 dst ff:ff:ff:ff:ff:ff > arp.pkt dnet send fxp0 < arp.pkt dnet send fxp0 < arp.pkt Send a fragmented ping packet: # Create ping packet with IP header, to set ICMP checksum echo "monkey monkey monkey monkey" | dnet icmp type 8 code 0 | \ dnet ip proto icmp src 1.2.3.4 dst 5.6.7.8 > ping.pkt # Chop off IP header dd if=ping.pkt of=ping.data bs=20 skip=1 # Fragment IP payload split -b 24 ping.data p. # Send fragments dnet ip id 1 off 0+ proto icmp src 1.2.3.4 dst 5.6.7.8 < p.aa | \ dnet send dnet ip id 1 off 24 proto icmp src 1.2.3.4 dst 5.6.7.8 < p.ab | \ dnet send Dug Song Oliver Falk