![]() |
![]()
| ![]() |
![]()
NAME
SYNOPSIS
DESCRIPTIONThe The applications supported by
The options supported by
EXAMPLES
scamper -P 31337 will start a
scamper(1)
instance listening on port 31337 on the loopback interface. To use
foo.example.com 192.0.2.1 2001:DB8::1 bar.example.com 192.0.2.2 2001:DB8::2 the following command will test these routers for responsiveness to ICMP, SSH, Telnet, HTTPS, HTTP, BGP, NTP, DNS, and SNMP probes, recording raw data into example-routers.warts: sc_filterpolicy -p 31337 -a routers.txt -t router -o example-routers.warts Including the name of each device in the input file is optional. The following command will only test the routers for responsiveness to SSH: sc_filterpolicy -p 31337 -a routers.txt -T +ssh -o example-ssh.warts To use db.example.com 192.0.2.3 db.example.com 2001::DB8::3 corp.example.com 192.0.2.4 corp.example.com 2001::DB8::4 the following command will test these servers for responsiveness to ICMP, FTP, SSH, Telnet, MySQL, RDP, HTTPS, SMB, HTTP, NTP, DNS, and SNMP probes, recording raw data into example-servers.warts: sc_filterpolicy -p 31337 -a servers.txt -t server -o example-servers.warts -O tuples In an input file formatted as tuples, the name (or an identifier) for each device is mandatory, and is used to ensure only one probe is sent to any one device at a time, and to collate responses from different addresses to the same device for reporting. Once raw data has been collected,
sc_filterpolicy -r example-routers.warts : T : e H : I l T H S : C S n T T B N D N : M S e P T G T N M : P H t S P P P S P ======================================== 192.0.2.1 : O O O O O 2001:DB8::1 : O O O O O 192.0.2.2 : O X 2001:DB8::2 : O O The first router is responsive (O) for ICMP, SSH, HTTP, DNS, and SNMP probes on all addresses. The second router is responsive (O) to ICMP probes on both addresses is unresponsive (X) to SSH on the IPv4 address, but is responsive (O) to SSH on the IPv6 address and possibly represents a filtering policy that is incongruent and requires attention. Note that the empty cells in the table represent a router that was unresponsive (X) to that protocol for all addresses tested; the cells are left empty to allow the user to focus on open and incongruent application services. The command: sc_filterpolicy -O incongruent -r example-routers.warts will only show routers with an incongruent filtering policy. SEE ALSOJ. Czyz, M. Luckie, M. Allman, and M. Bailey, Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy, Proc. Network and Distributed Systems Security (NDSS) Conference 2016. scamper(1), sc_wartsdump(1), sc_warts2json(1), warts(5) AUTHORS
|