This file is indexed.

/usr/share/doc/netwox-doc/tools/40.html is in netwox-doc 5.39.0-1.2.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
<HTML>
 <HEAD>
 <TITLE>Tool 40: Spoof Ip4Tcp packet</TITLE>
 </HEAD>
 <BODY BGCOLOR="#FFFFFF">
  <CENTER>   <H3>Tool 40: Spoof Ip4Tcp packet</H3>
  </CENTER>

  <P><H3>Description:</H3>
   <PRE>
  This tool sends a fake packet on the network.
  Each parameter name should be self explaining.
  Parameter --spoofip indicates how to generate link layer for spoofing.
  Values 'best', 'link' or 'raw' are common choices for --spoofip. Here
  is the list of accepted values:
   - 'raw' means to spoof at IP4/IP6 level (it uses system IP stack). If
     a firewall is installed, or on some systems, this might not work.
   - 'linkf' means to spoof at link level (currently, only Ethernet is
     supported). The 'f' means to Fill source Ethernet address.
     However, if source IP address is spoofed, it might be impossible
     to Fill it. So, linkf will not work: use linkb or linkfb instead.
   - 'linkb' means to spoof at link level. The 'b' means to left a Blank
     source Ethernet address (0:0:0:0:0:0, do not try to Fill it).
   - 'linkfb' means to spoof at link level. The 'f' means to try to Fill
     source Ethernet address, but if it is not possible, it is left
     Blank.
   - 'rawlinkf' means to try 'raw', then try 'linkf'
   - 'rawlinkb' means to try 'raw', then try 'linkb'
   - 'rawlinkfb' means to try 'raw', then try 'linkfb'
   - 'linkfraw' means to try 'linkf', then try 'raw'
   - 'linkbraw' means to try 'linkb', then try 'raw'
   - 'linkfbraw' means to try 'linkfb', then try 'raw'
   - 'link' is an alias for 'linkfb'
   - 'rawlink' is an alias for 'rawlinkfb'
   - 'linkraw' is an alias for 'linkfbraw'
   - 'best' is an alias for 'linkraw'. It should work in all cases.
  
  This tool may need to be run with admin privilege in order to spoof.
   </PRE>

  <P><H3>Synonyms:</H3>
  &nbsp;&nbsp;hping, send<BR>

  <P><H3>Usage:</H3>
  &nbsp;&nbsp;netwox 40 [-c uint32] [-e uint32] [-f|+f] [-g|+g] [-h|+h] [-i uint32] [-j uint32] [-k uint32] [-l ip] [-m ip] [-n ip4opts] [-o port] [-p port] [-q uint32] [-r uint32] [-s|+s] [-t|+t] [-u|+u] [-v|+v] [-w|+w] [-x|+x] [-y|+y] [-z|+z] [-A|+A] [-B|+B] [-C|+C] [-D|+D] [-E uint32] [-F uint32] [-G tcpopts] [-H mixed_data] [-a spoofip] [-J uint32] [-K uint32] [-L uint32] [-M uint32] [-N uint32]<BR>

  <P><H3>Parameters:</H3>
<TABLE BORDER=1 CELLPADDING=4>
 <TR>
  <TD ALIGN=middle><I>parameter</I></TD>
  <TD ALIGN=middle><I>description</I></TD>
  <TD ALIGN=middle><I>example</I></TD>
 </TR>
 <TR><TD><TT>-c|--ip4-tos uint32</TD>
<TD>IP4 tos</TD>
<TD>0</TD></TR>
<TR><TD><TT>-e|--ip4-id uint32</TD>
<TD>IP4 id (rand if unset)</TD>
<TD>0</TD></TR>
<TR><TD><TT>-f|--ip4-reserved|+f|--no-ip4-reserved</TD>
<TD>IP4 reserved</TD>
<TD>&nbsp;</TD></TR>
<TR><TD><TT>-g|--ip4-dontfrag|+g|--no-ip4-dontfrag</TD>
<TD>IP4 dontfrag</TD>
<TD>&nbsp;</TD></TR>
<TR><TD><TT>-h|--ip4-morefrag|+h|--no-ip4-morefrag</TD>
<TD>IP4 morefrag</TD>
<TD>&nbsp;</TD></TR>
<TR><TD><TT>-i|--ip4-offsetfrag uint32</TD>
<TD>IP4 offsetfrag</TD>
<TD>0</TD></TR>
<TR><TD><TT>-j|--ip4-ttl uint32</TD>
<TD>IP4 ttl</TD>
<TD>0</TD></TR>
<TR><TD><TT>-k|--ip4-protocol uint32</TD>
<TD>IP4 protocol</TD>
<TD>0</TD></TR>
<TR><TD><TT>-l|--ip4-src ip</TD>
<TD>IP4 src</TD>
<TD>192.168.100.200</TD></TR>
<TR><TD><TT>-m|--ip4-dst ip</TD>
<TD>IP4 dst</TD>
<TD>5.6.7.8</TD></TR>
<TR><TD><TT>-n|--ip4-opt ip4opts</TD>
<TD>IPv4 options</TD>
<TD>&nbsp;</TD></TR>
<TR><TD><TT>-o|--tcp-src port</TD>
<TD>TCP src</TD>
<TD>1234</TD></TR>
<TR><TD><TT>-p|--tcp-dst port</TD>
<TD>TCP dst</TD>
<TD>80</TD></TR>
<TR><TD><TT>-q|--tcp-seqnum uint32</TD>
<TD>TCP seqnum (rand if unset)</TD>
<TD>0</TD></TR>
<TR><TD><TT>-r|--tcp-acknum uint32</TD>
<TD>TCP acknum</TD>
<TD>0</TD></TR>
<TR><TD><TT>-s|--tcp-reserved1|+s|--no-tcp-reserved1</TD>
<TD>TCP reserved1</TD>
<TD>&nbsp;</TD></TR>
<TR><TD><TT>-t|--tcp-reserved2|+t|--no-tcp-reserved2</TD>
<TD>TCP reserved2</TD>
<TD>&nbsp;</TD></TR>
<TR><TD><TT>-u|--tcp-reserved3|+u|--no-tcp-reserved3</TD>
<TD>TCP reserved3</TD>
<TD>&nbsp;</TD></TR>
<TR><TD><TT>-v|--tcp-reserved4|+v|--no-tcp-reserved4</TD>
<TD>TCP reserved4</TD>
<TD>&nbsp;</TD></TR>
<TR><TD><TT>-w|--tcp-cwr|+w|--no-tcp-cwr</TD>
<TD>TCP cwr</TD>
<TD>&nbsp;</TD></TR>
<TR><TD><TT>-x|--tcp-ece|+x|--no-tcp-ece</TD>
<TD>TCP ece</TD>
<TD>&nbsp;</TD></TR>
<TR><TD><TT>-y|--tcp-urg|+y|--no-tcp-urg</TD>
<TD>TCP urg</TD>
<TD>&nbsp;</TD></TR>
<TR><TD><TT>-z|--tcp-ack|+z|--no-tcp-ack</TD>
<TD>TCP ack</TD>
<TD>&nbsp;</TD></TR>
<TR><TD><TT>-A|--tcp-psh|+A|--no-tcp-psh</TD>
<TD>TCP psh</TD>
<TD>&nbsp;</TD></TR>
<TR><TD><TT>-B|--tcp-rst|+B|--no-tcp-rst</TD>
<TD>TCP rst</TD>
<TD>&nbsp;</TD></TR>
<TR><TD><TT>-C|--tcp-syn|+C|--no-tcp-syn</TD>
<TD>TCP syn</TD>
<TD>&nbsp;</TD></TR>
<TR><TD><TT>-D|--tcp-fin|+D|--no-tcp-fin</TD>
<TD>TCP fin</TD>
<TD>&nbsp;</TD></TR>
<TR><TD><TT>-E|--tcp-window uint32</TD>
<TD>TCP window</TD>
<TD>0</TD></TR>
<TR><TD><TT>-F|--tcp-urgptr uint32</TD>
<TD>TCP urgptr</TD>
<TD>0</TD></TR>
<TR><TD><TT>-G|--tcp-opt tcpopts</TD>
<TD>TCP options</TD>
<TD>&nbsp;</TD></TR>
<TR><TD><TT>-H|--tcp-data mixed_data</TD>
<TD>mixed data</TD>
<TD>&nbsp;</TD></TR>
<TR><TD><TT>-a|--spoofip spoofip</TD>
<TD>IP spoof initialization type</TD>
<TD>best</TD></TR>
<TR><TD><TT>-J|--ip4-ihl uint32</TD>
<TD>IP4 ihl</TD>
<TD>5</TD></TR>
<TR><TD><TT>-K|--ip4-totlen uint32</TD>
<TD>IP4 totlen</TD>
<TD>0</TD></TR>
<TR><TD><TT>-L|--ip4-checksum uint32</TD>
<TD>IP4 checksum</TD>
<TD>0</TD></TR>
<TR><TD><TT>-M|--tcp-doff uint32</TD>
<TD>TCP data offset</TD>
<TD>0</TD></TR>
<TR><TD><TT>-N|--tcp-checksum uint32</TD>
<TD>TCP checksum</TD>
<TD>0 </TD></TR>
</TABLE>

  <P><H3>Example:</H3>
  &nbsp;&nbsp;netwox 40<BR>
<BR>
 </BODY>
 </HTML>