/usr/share/doc/netwox-doc/tools/193.html is in netwox-doc 5.39.0-1.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 | <HTML>
<HEAD>
<TITLE>Tool 193: IDENT client requesting info about an open session</TITLE>
</HEAD>
<BODY BGCOLOR="#FFFFFF">
<CENTER> <H3>Tool 193: IDENT client requesting info about an open session</H3>
</CENTER>
<P><H3>Description:</H3>
<PRE>
This tool queries an IDENT server.
It obtains information about a current TCP session between local
computer and IDENT server computer. This current session is defined
by --localport and --remoteport.
Parameter --dst-ip is the address of remote host/server.
Parameter --dst-port is the port number where to connect.
Optional parameter --src-ip defines the local IP address to use.
Optional parameter --src-port defines the local port number to use.
Optional parameter --ip4opts permits to add IP4 options encoded as
mixed.
Optional parameter --ip6exts permits to add IP6 options encoded as
mixed (first byte is the next header number).
Optional parameters --device, --src-eth and --dst-eth permits to
create a virtual client using fake addresses (in this case, tool have
to be run with admin privilege in order to sniff and spoof at
Ethernet level).
</PRE>
<P><H3>Usage:</H3>
netwox 193 -i ip -L port -R port [-d device] [-E eth] [-e eth] [-I ip] [-P port] [-p port] [-o ip4opts] [-O ip6exts] [-T uint32]<BR>
<P><H3>Parameters:</H3>
<TABLE BORDER=1 CELLPADDING=4>
<TR>
<TD ALIGN=middle><I>parameter</I></TD>
<TD ALIGN=middle><I>description</I></TD>
<TD ALIGN=middle><I>example</I></TD>
</TR>
<TR><TD><TT>-i|--dst-ip ip</TD>
<TD>destination IP address</TD>
<TD>5.6.7.8</TD></TR>
<TR><TD><TT>-L|--localport port</TD>
<TD>local port of session to query</TD>
<TD>1234</TD></TR>
<TR><TD><TT>-R|--remoteport port</TD>
<TD>remote port of session to query</TD>
<TD>80</TD></TR>
<TR><TD><TT>-d|--device device</TD>
<TD>device name</TD>
<TD>Eth0</TD></TR>
<TR><TD><TT>-E|--src-eth eth</TD>
<TD>source ethernet address</TD>
<TD>0:2:3:4:5:6</TD></TR>
<TR><TD><TT>-e|--dst-eth eth</TD>
<TD>destination ethernet address</TD>
<TD>0:8:9:a:b:c</TD></TR>
<TR><TD><TT>-I|--src-ip ip</TD>
<TD>source IP address</TD>
<TD>192.168.100.200</TD></TR>
<TR><TD><TT>-P|--src-port port</TD>
<TD>source port number</TD>
<TD>0</TD></TR>
<TR><TD><TT>-p|--dst-port port</TD>
<TD>destination port number</TD>
<TD>113</TD></TR>
<TR><TD><TT>-o|--ip4opts ip4opts</TD>
<TD>IPv4 options</TD>
<TD> </TD></TR>
<TR><TD><TT>-O|--ip6exts ip6exts</TD>
<TD>IPv6 extensions</TD>
<TD> </TD></TR>
<TR><TD><TT>-T|--timeout uint32</TD>
<TD>timeout in milliseconds</TD>
<TD>60000 </TD></TR>
</TABLE>
<P><H3>Examples:</H3>
netwox 193 -i "5.6.7.8" -L "1234" -R "80"<BR>
<BR>
netwox 193 --dst-ip "5.6.7.8" --localport "1234" --remoteport "80"<BR>
<BR>
</BODY>
</HTML>
|