Mausezahn

From Wikipedia, the free encyclopedia
Jump to: navigation, search
Mausezahn
Mausezahn logo.png
Original author(s) Herbert Haas
Developer(s) netsniff-ng developers
Stable release 0.40 / 7 July 2010; 4 years ago (2010-07-07)
Development status Original tool frozen; continuing development within netsniff-ng
Written in C
Operating system Linux
License GNU GPLv2
Website www.perihel.at/sec/mz/

Mausezahn (German pronunciation: [ˈmaʊ̯zəˌʦaːn], German for "mouse tooth") is a fast network traffic generator written in C which allows the user to craft nearly every possible and "impossible" packet. Since version 0.31 Mausezahn is open source in terms of the GPLv2. Herbert Haas, the original developer of Mausezahn, died on 25 June 2011.[1] The project has been incorporated into the netsniff-ng toolkit, and continues to be developed there.[2]

Typical applications of Mausezahn include:

  • Testing or stressing IP multicast networks
  • Penetration testing of firewalls and IDS
  • Finding weaknesses in network software or appliances
  • Creation of malformed packets to verify whether a system processes a given protocol correctly
  • Didactical demonstrations as lab utility

Mausezahn allows sending an arbitrary sequence of bytes directly out of the network interface card. An integrated packet builder provides a simple command line interface for more complicated packets. Since version 0.38, Mausezahn offers a multi-threaded mode[3] with Cisco-style command line interface.

Features[edit]

As of version 0.38 Mausezahn supports the following features:[4]

Mausezahn only sends exactly the packet the user has specified. Therefore it is rather less suited for vulnerability audits where additional algorithms are required to detect open ports behind a firewall and to automatically evade intrusion detection systems (IDS). However, a network administrator could implement audit routines via a script that utilizes Mausezahn for creating the actual packets.

Platforms[edit]

Mausezahn currently runs only on Linux systems and there are no plans to port it to the Windows operating system.[5]

See also[edit]

References[edit]

External links[edit]