tcpbridge man page on Kali

Man page or keyword search:  
man Server   9211 pages
apropos Keyword Search (all sections)
Output format
Kali logo
[printable version]

tcpbridge(1)			 User Commands			  tcpbridge(1)

NAME
       tcpbridge - Bridge network traffic across two interfaces

SYNOPSIS
       tcpbridge [-flags] [-flag [value]] [--option-name[[=| ]value]]

       All arguments must be options.

       tcpbridge  is a tool for selectively briding network traffic across two
       interfaces and optionally modifying the packets in between

DESCRIPTION
       The basic operation of tcpbridge is to be a network bridge between  two
       subnets.	 All packets received on one interface are sent via the other.

       Optionally,  packets  can  be  edited in a variety of ways according to
       your needs.

       For more details, please see the	 Tcpreplay  Manual  at:	 http://tcpre‐
       play.appneta.com

OPTIONS

       -r string, --portmap=string
	      Rewrite TCP/UDP ports.  This option may appear up to 9999 times.

	      Specify a list of comma delimited port mappingings consisting of
	      colon delimited port number pairs.  Each	colon  delimited  port
	      pair  consists  of the port to match followed by the port number
	      to rewrite.

	      Examples:
		  --portmap=80:8000 --portmap=8080:80	 # 80->8000 and 8080->80
		  --portmap=8000,8080,88888:80		 # 3 different ports become 80
		  --portmap=8000-8999:80		 # ports 8000 to 8999 become 80

       -s number, --seed=number
	      Randomize src/dst IPv4/v6 addresses w/ given seed.  This	option
	      may appear up to 1 times.	 This option must not appear in combi‐
	      nation with any  of  the	following  options:  fuzz-seed.	  This
	      option takes an integer number as its argument.

	      Causes the source and destination IPv4/v6 addresses to be pseudo
	      randomized  but  still  maintain	client/server	relationships.
	      Since  the randomization is deterministic based on the seed, you
	      can reuse the same seed value to recreate the traffic.

       -N string, --pnat=string
	      Rewrite IPv4/v6 addresses using  pseudo-NAT.   This  option  may
	      appear  up  to 2 times.  This option must not appear in combina‐
	      tion with any of the following options: srcipmap.

	      Takes a comma delimited series of colon delimited CIDR  netblock
	      pairs.   Each netblock pair is evaluated in order against the IP
	      addresses.  If the IP address in the packet  matches  the	 first
	      netblock,	 it  is	 rewritten using the second netblock as a mask
	      against the high order bits.

	      IPv4 Example:
		  --pnat=192.168.0.0/16:10.77.0.0/16,172.16.0.0/12:10.1.0.0/24
	      IPv6 Example:
		  --pnat=[2001:db8::/32]:[dead::/16],[2001:db8::/32]:[::ffff:0:0/96]

       -S string, --srcipmap=string
	      Rewrite source IPv4/v6 addresses using pseudo-NAT.  This	option
	      may appear up to 1 times.	 This option must not appear in combi‐
	      nation with any of the following options: pnat.

	      Works just like the --pnat option, but only affects  the	source
	      IP addresses in the IPv4/v6 header.

       -D string, --dstipmap=string
	      Rewrite  destination  IPv4/v6  addresses using pseudo-NAT.  This
	      option may appear up to 1 times.	This option must not appear in
	      combination with any of the following options: pnat.

	      Works just like the --pnat option, but only affects the destina‐
	      tion IP addresses in the IPv4/v6 header.

       -e string, --endpoints=string
	      Rewrite IP addresses to be between two endpoints.	  This	option
	      may  appear  up to 1 times.  This option must appear in combina‐
	      tion with the following options: cachefile.

	      Takes a pair of colon delimited IPv4/v6 addresses which will  be
	      used  to	rewrite all traffic to appear to be between the two IP
	      addresses.

	      IPv4 Example:
		  --endpoints=172.16.0.1:172.16.0.2
	      IPv6 Example:
		  --endpoints=[2001:db8::dead:beef]:[::ffff:0:0:ac:f:0:2]

       -b, --skipbroadcast
	      Skip rewriting broadcast/multicast IPv4/v6 addresses.

	      By default --seed, --pnat and --endpoints will rewrite broadcast
	      and  multicast IPv4/v6 and MAC addresses. Setting this flag will
	      keep broadcast/multicast IPv4/v6 and MAC	addresses  from	 being
	      rewritten.

       -C, --fixcsum
	      Force recalculation of IPv4/TCP/UDP header checksums.

	      Causes  each IPv4/v6 packet to have their checksums recalculated
	      and fixed.  Automatically	 enabled  for  packets	modified  with
	      --seed, --pnat, --endpoints or --fixlen.

       -m number, --mtu=number
	      Override	default	 MTU  length  (1500  bytes).   This option may
	      appear up to 1 times.  This option takes an  integer  number  as
	      its argument.  The value of number is constrained to being:
		  in the range	1 through MAXPACKET

	      Override the default 1500 byte MTU size for determining the max‐
	      imum padding length (--fixlen=pad) or when truncating (--mtu-
	      trunc).

       --mtu-trunc
	      Truncate packets larger then specified MTU.  This option may
	      appear up to 1 times.

	      Similar to --fixlen, this option will truncate data in packets
	      from Layer 3 and above to be no larger then the MTU.

       -E, --efcs
	      Remove Ethernet checksums (FCS) from end of frames.

	      Note, this option is pretty dangerous!  We do not actually check
	      to see if a FCS actually exists in the frame, we just blindly
	      delete the last 4 bytes.	Hence, you should only use this if you
	      know know that your OS provides the FCS when reading raw pack‐
	      ets.

       --ttl=string
	      Modify the IPv4/v6 TTL/Hop Limit.

	      Allows you to modify the TTL/Hop Limit of all the IPv4/v6 pack‐
	      ets.  Specify a number to hard-code the value or +/-value to
	      increase or decrease by the value provided (limited to 1-255).

	      Examples:
		  --ttl=10
		  --ttl=+7
		  --ttl=-64

       --tos=number
	      Set the IPv4 TOS/DiffServ/ECN byte.  This option may appear up
	      to 1 times.  This option takes an integer number as its argu‐
	      ment.  The value of number is constrained to being:
		  in the range	0 through 255

	      Allows you to override the TOS (also known as DiffServ/ECN)
	      value in IPv4.

       --tclass=number
	      Set the IPv6 Traffic Class byte.	This option may appear up to 1
	      times.  This option takes an integer number as its argument.
	      The value of number is constrained to being:
		  in the range	0 through 255

	      Allows you to override the IPv6 Traffic Class field.

       --flowlabel=number
	      Set the IPv6 Flow Label.	This option may appear up to 1 times.
	      This option takes an integer number as its argument.  The value
	      of number is constrained to being:
		  in the range	0 through 1048575

	      Allows you to override the 20bit IPv6 Flow Label field.  Has no
	      effect on IPv4 packets.

       -F string, --fixlen=string
	      Pad or truncate packet data to match header length.  This option
	      may appear up to 1 times.

	      Packets may be truncated during capture if the snaplen is
	      smaller then the packet.	This option allows you to modify the
	      packet to pad the packet back out to the size stored in the
	      IPv4/v6 header or rewrite the IP header total length to reflect
	      the stored packet length.

	      pad Truncated packets will be padded out so that the packet
	      length matches the IPv4 total length

	      trunc Truncated packets will have their IPv4 total length field
	      rewritten to match the actual packet length

	      del Delete the packet

       --fuzz-seed=number
	      Fuzz 1 in X packets. Edit bytes, length, or emulate packet drop.
	      This option takes an integer number as its argument.  The value
	      of number is constrained to being:
		  greater than or equal to 0
	      The default number for this option is:
		   0

	      This fuzzing was designed as to test layer 7 protocols such as
	      voip protocols.  It modifies randomly 1 out of X packets (where
	      X = --fuzz-factor) in order for stateful protocols to cover more
	      of their code.  The random fuzzing actions focus on data start
	      and end because it often is the part of the data application
	      protocols base their decisions on.

	      Possible fuzzing actions list:
	       * drop packet
	       * reduce packet size
	       * edit packet Bytes:
		 * Not all Bytes have the same probability of appearance in
	      real life.
		   Replace with 0x00, 0xFF, or a random byte with equal like‐
	      lyhook
		 * Not all Bytes have the same significance in a packet.
		   Replace the start, the end, or the middle of the packet
	      with equal likelihood.
	       * do nothing (7 out of 8 packets)

       --fuzz-factor=number
	      Set the Fuzz 1 in X packet ratio (default 1 in 8 packets).  This
	      option must appear in combination with the following options:
	      fuzz-seed.  This option takes an integer number as its argument.
	      The value of number is constrained to being:
		  greater than or equal to 1
	      The default number for this option is:
		   8

	      Sets the ratio of for --fuzz-seed option. By default this value
	      is 8, which means 1 in 8 packets are modified by fuzzing. Note
	      that this ratio is based on the random number genereated by the
	      supplied fuzz seed. Therefore by default you cannot expect that
	      exactly every eighth packet will be modified.

       --skipl2broadcast
	      Skip rewriting broadcast/multicast Layer 2 addresses.

	      By default, editing Layer 2 addresses will rewrite broadcast and
	      multicast MAC addresses.	 Setting this flag will keep broad‐
	      cast/multicast MAC addresses from being rewritten.

       --dlt=string
	      Override output DLT encapsulation.  This option may appear up to
	      1 times.

	      By default, no DLT (data link type) conversion will be made.  To
	      change the DLT type of the output pcap, select one of the fol‐
	      lowing values:

	      enet Ethernet aka DLT_EN10MB

	      hdlc Cisco HDLC aka DLT_C_HDLC

	      jnpr_ether Juniper Ethernet DLT_C_JNPR_ETHER

	      pppserial PPP Serial aka DLT_PPP_SERIAL

	      user User specified Layer 2 header and DLT type

       --enet-dmac=string
	      Override destination ethernet MAC addresses.  This option may
	      appear up to 1 times.

	      Takes a pair of comma deliminated ethernet MAC addresses which
	      will replace the destination MAC address of outbound packets.
	      The first MAC address will be used for the server to client
	      traffic and the optional second MAC address will be used for the
	      client to server traffic.

	      Example:
		  --enet-dmac=00:12:13:14:15:16,00:22:33:44:55:66

       --enet-smac=string
	      Override source ethernet MAC addresses.  This option may appear
	      up to 1 times.

	      Takes a pair of comma deliminated ethernet MAC addresses which
	      will replace the source MAC address of outbound packets.	The
	      first MAC address will be used for the server to client traffic
	      and the optional second MAC address will be used for the client
	      to server traffic.

	      Example:
		  --enet-smac=00:12:13:14:15:16,00:22:33:44:55:66

       --enet-subsmac=string
	      Substitute MAC addresses.	 This option may appear up to 9999
	      times.

	      Allows you to rewrite ethernet MAC addresses of packets. It
	      takes comma delimited pair or MACs address and rewrites all
	      occurrences of the first MAC with the value of the second MAC.
	      Example:
		  --enet-subsmac=00:12:13:14:15:16,00:22:33:44:55:66

       --enet-mac-seed=number
	      Randomize MAC addresses.	This option may appear up to 1 times.
	      This option must not appear in combination with any of the fol‐
	      lowing options: enet-smac, enet-dmac, enet-subsmac.  This option
	      takes an integer number as its argument.

	      Allows you to randomize ethernet MAC addresses of packets,
	      mostly like what --seed option does for IPv4/IPv6 addresses.

       --enet-mac-seed-keep-bytes=number
	      Randomize MAC addresses.	This option may appear up to 1 times.
	      This option must appear in combination with the following
	      options: enet-mac-seed.  This option takes an integer number as
	      its argument.  The value of number is constrained to being:
		  in the range	1 through 6

	      Keep some bytes untouched when usinging --enet-mac-seed option.

       --enet-vlan=string
	      Specify ethernet 802.1q VLAN tag mode.  This option may appear
	      up to 1 times.

	      Allows you to rewrite ethernet frames to add a 802.1q header to
	      standard 802.3 ethernet headers or remove the 802.1q VLAN tag
	      information.

	      add Rewrites the existing 802.3 ethernet header as an 802.1q
	      VLAN header

	      del Rewrites the existing 802.1q VLAN header as an 802.3 ether‐
	      net header

       --enet-vlan-tag=number
	      Specify the new ethernet 802.1q VLAN tag value.  This option may
	      appear up to 1 times.  This option must appear in combination
	      with the following options: enet-vlan.  This option takes an
	      integer number as its argument.  The value of number is con‐
	      strained to being:
		  in the range	0 through 4095

       --enet-vlan-cfi=number
	      Specify the ethernet 802.1q VLAN CFI value.  This option may
	      appear up to 1 times.  This option must appear in combination
	      with the following options: enet-vlan.  This option takes an
	      integer number as its argument.  The value of number is con‐
	      strained to being:
		  in the range	0 through 1

       --enet-vlan-pri=number
	      Specify the ethernet 802.1q VLAN priority.  This option may
	      appear up to 1 times.  This option must appear in combination
	      with the following options: enet-vlan.  This option takes an
	      integer number as its argument.  The value of number is con‐
	      strained to being:
		  in the range	0 through 7

       --hdlc-control=number
	      Specify HDLC control value.  This option may appear up to 1
	      times.  This option takes an integer number as its argument.

	      The Cisco HDLC header has a 1 byte "control" field.  Apparently
	      this should always be 0, but if you can use any 1 byte value.

       --hdlc-address=number
	      Specify HDLC address.  This option may appear up to 1 times.
	      This option takes an integer number as its argument.

	      The Cisco HDLC header has a 1 byte "address" field which has two
	      valid values:

	      0x0F Unicast

	      0xBF Broadcast
	      You can however specify any single byte value.

       --user-dlt=number
	      Set output file DLT type.	 This option may appear up to 1 times.
	      This option takes an integer number as its argument.

	      Set the DLT value of the output pcap file.

       --user-dlink=string
	      Rewrite Data-Link layer with user specified data.	 This option
	      may appear up to 2 times.

	      Provide a series of comma deliminated hex values which will be
	      used to rewrite or create the Layer 2 header of the packets.
	      The first instance of this argument will rewrite both server and
	      client traffic, but if this argument is specified a second time,
	      it will be used for the client traffic.

	      Example:
		  --user-dlink=01,02,03,04,05,06,00,1A,2B,3C,4D,5E,6F,08,00

       -d number, --dbug=number
	      Enable debugging output.	This option may appear up to 1 times.
	      This option takes an integer number as its argument.  The value
	      of number is constrained to being:
		  in the range	0 through 5
	      The default number for this option is:
		   0

	      If configured with --enable-debug, then you can specify a ver‐
	      bosity level for debugging output.  Higher numbers increase ver‐
	      bosity.

       -i string, --intf1=string
	      Primary interface (listen in uni-directional mode).  This option
	      may appear up to 1 times.

       -I string, --intf2=string
	      Secondary interface (send in uni-directional mode).  This option
	      may appear up to 1 times.

       -u, --unidir
	      Send and receive in only one direction.  This option may appear
	      up to 1 times.

	      Normally, tcpbridge will send and receive traffic in both direc‐
	      tions (bi-directionally).	 However, if you choose this option,
	      traffic will be sent uni-directionally.

       --listnics
	      List available network interfaces and exit.

       -L number, --limit=number
	      Limit the number of packets to send.  This option may appear up
	      to 1 times.  This option takes an integer number as its argu‐
	      ment.  The value of number is constrained to being:
		  greater than or equal to 1
	      The default number for this option is:
		   -1

	      By default, tcpbridge will send packets forever or until Ctrl-C.
	      Alternatively, you can specify a maximum number of packets to
	      send.

       -M string, --mac=string
	      MAC addresses of local NIC's.  This option may appear up to 2
	      times.

	      tcpbridge does not support detecting the MAC addresses of the
	      local network interfaces under Windows.  Please specify both MAC
	      addresses of the interfaces used in the bridge: -M <intf1 mac>
	      -M <intf2 mac>

       -x string, --include=string
	      Include only packets matching rule.  This option may appear up
	      to 1 times.  This option must not appear in combination with any
	      of the following options: exclude.

	      Override default of sending all packets stored in the capture
	      file and only send packets which match the provided rule.	 Rules
	      can be one of:

	      S:<CIDR1>,...  - Source IP must match specified CIDR(s)

	      D:<CIDR1>,...  - Destination IP must match specified CIDR(s)

	      B:<CIDR1>,...  - Both source and destination IP must match spec‐
	      ified CIDR(s)

	      E:<CIDR1>,...  - Either IP must match specified CIDR(s)

	      P:<LIST> - Must be one of the listed packets where the list cor‐
	      responds to the packet number in the capture file.
		  --include=P:1-5,9,15,72-
	      would send packets 1 thru 5, the 9th and 15th packet, and pack‐
	      ets 72 until the end of the file

	      F:'<bpf>' - BPF filter.  See the tcpdump(8) man page for syntax.

       -X string, --exclude=string
	      Exclude any packet matching this rule.  This option may appear
	      up to 1 times.  This option must not appear in combination with
	      any of the following options: include.

	      Override default of sending all packets stored in the capture
	      file and only send packets which do not match the provided rule.
	      Rules can be one of:

	      S:<CIDR1>,...  - Source IP must not match specified CIDR(s)

	      D:<CIDR1>,...  - Destination IP must not match specified CIDR(s)

	      B:<CIDR1>,...  - Both source and destination IP must not match
	      specified CIDR(s)

	      E:<CIDR1>,...  - Either IP must not match specified CIDR(s)

	      P:<LIST> - Must not be one of the listed packets where the list
	      corresponds to the packet number in the capture file.
		  --exclude=P:1-5,9,15,72-
	      would drop packets 1 thru 5, the 9th and 15th packet, and pack‐
	      ets 72 until the end of the file

       -P, --pid
	      Print the PID of tcpbridge at startup.

       -v, --verbose
	      Print decoded packets via tcpdump to STDOUT.  This option may
	      appear up to 1 times.

       -A string, --decode=string
	      Arguments passed to tcpdump decoder.  This option may appear up
	      to 1 times.  This option must appear in combination with the
	      following options: verbose.

	      When enabling verbose mode (-v) you may also specify one or more
	      additional  arguments to pass to tcpdump to modify the way pack‐
	      ets are decoded.	By default, -n and -l are used.	  Be  sure  to
	      quote the arguments like: --verbose="-axxx" so that they are not
	      interpreted by tcpbridge.	 The following arguments are valid:
		  [ -aAeNqRStuvxX ]
		  [ -E spi@ipaddr algo:secret,... ]
		  [ -s snaplen ]

       -V, --version
	      Print version information.

       -h, --less-help
	      Display less usage information and exit.

       -H, --help
	      Display usage information and exit.

       -!, --more-help
	      Pass the extended usage information through a pager.

       --save-opts [=cfgfile]
	      Save the option state to cfgfile.	 The default is the last con‐
	      figuration file listed in the OPTION PRESETS section, below.
	      The command will exit after updating the config file.

       --load-opts=cfgfile, --no-load-opts
	      Load options from cfgfile.  The no-load-opts form will disable
	      the loading of earlier config/rc/ini files.  --no-load-opts is
	      handled early, out of order.

OPTION PRESETS
       Any option that is not marked as not presettable may be preset by load‐
       ing values from configuration ("RC" or ".INI") file(s).	The homerc
       file is "$$/", unless that is a directory.  In that case, the file
       ".tcpbridgerc" is searched for within that directory.

FILES
       See OPTION PRESETS for configuration files.

EXIT STATUS
       One of the following exit values will be returned:

       0  (EXIT_SUCCESS)
	      Successful program execution.

       1  (EXIT_FAILURE)
	      The operation failed or the command syntax was not valid.

       66  (EX_NOINPUT)
	      A specified configuration file could not be loaded.

       70  (EX_SOFTWARE)
	      libopts had an internal operational error.  Please report it to
	      autogen-users@lists.sourceforge.net.  Thank you.

AUTHORS
       Copyright 2013-2017 Fred Klassen - AppNeta Copyright 2000-2012 Aaron
       Turner For support please use the tcpreplay-users@lists.sourceforge.net
       mailing list.  The latest version of this software is always available
       from: http://tcpreplay.appneta.com/

COPYRIGHT
       Copyright (C) 2000-2017 Aaron Turner and Fred Klassen all rights
       reserved.  This program is released under the terms of the GNU General
       Public License, version 3 or later.

BUGS
       Please send bug reports to: tcpreplay-users@lists.sourceforge.net

NOTES
       This manual page was AutoGen-erated from the tcpbridge option defini‐
       tions.

tcpbridge			  16 May 2017			  tcpbridge(1)
[top]

List of man pages available for Kali

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net