-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathNS1-Subject.txt
More file actions
72 lines (55 loc) · 1.94 KB
/
NS1-Subject.txt
File metadata and controls
72 lines (55 loc) · 1.94 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
Last update: 11/03/2017
CEI - NETSEC #1
-----------------
- Project info -
Name: Yellow
Reading material:
RFC129, RFC147, raw sockets
**See FAQ_NS1.txt for more information.**
---
- Validation criteria -
The final project must be :
completed,
stable,
usable,
packaged.
A technical and user documentation must be provided as PDF.
The packaging must be at least for Debian 64bits (.deb package).
During the final defense, the package will be installed through dpkg and
tested as is.
You **must provide** a complete **testing environment** for your features plus
unit tests.
This part is mandatory, otherwise the project and the module will be considered
as failed.
---
- Accepted languages and libraries -
C or C++ with only standard library (STL).
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
You can use any library for graphics or curse as long as you **only** use them
for user interface.
Any network/pcap parsing library, pcap file loading library, ... will be considered as cheating and thus giving
you a final mark of -42 and fail to the module.
Obviously, Boost, libpcap, ... are forbidden.
---
- Project -
The final goal is to write a software able to perform network analysis with
at least the features described in the "Mandatory features" section of
this document.
This software must be able to run on Linux.
You must provide an environment to try the features you've implemented.
You also must provide unit tests for your software.
- Mandatory features -
* live packet capture from raw sockets
* packet capture to file (must be pcap compatible)
* loading capture from file (must be able to load a pcap file)
* packet filtering (protobol and port, source ip, destination ip, ...)
* packet forging
* packet contents visualization
* global traffic visualization
- Optional features -
* on the fly packet modification
* ARP poisoning
* Man In The Middle attack
* login/passwords aggregator
* service fingerprinting
* DNS Poisoning