pixiliate 0.4.2 reviewDownload
Pixilate is a commandline packet generation utility that reads Cisco PIX 6.2x or Cisco IOS ACLs as input and generates the appropriat
Pixilate is a commandline packet generation utility that reads Cisco PIX 6.2x or Cisco IOS ACLs as input and generates the appropriate packets.
pixilate is currently capable of generating TCP/UDP/ICMP (various ICMP types), and IGMP utilizing the Libnet 1.1.x library available from http://www.packetfactory.net. NOTE: Libnet 1.0.x is NOT compatible."
The primary goal of pixilate is to validate firewall ACLs. Pixilate accomplishes this by generating the appropriate packets for each access list entry. Since the source address will often be spoofed, pixilate does not contain any packet capturing capability. If you are generating access lists by hand and specify the source address to be either your actual
IP address or an IP address on your network that you are capable of sniffing via promiscuous mode or a spanned port on a switch, you must provide your own sniffer. Tcpdump or ethereal are excellent choices.
Pixilate requires a remote sniffer capable of receiving all traffic with a destination behind the firewall. This will typically be a spanned port on the same switch as the firewall itself. This is obviously needed to validate various destination addresses. Packets with a destination of 'any' will be sent to the default destination address supplied by the required -d option.
What's New in This Release:
Update to support libnet 1.1.2 api changes which are incompatible with previous versions.
pixiliate 0.4.2 search tags