table of contents
nemesis-ospf(1) | General Commands Manual (usm) | nemesis-ospf(1) |
NAME¶
nemesis-ospf
—
OSPF Protocol (The Nemesis Project)
SYNOPSIS¶
nemesis-ospf |
[-vZ? ] [-p
TYPE] [-N
ADDR] [-i
SEC] [-l
SEC] [-z
LEN] [-x
TYPE] [-B
NUM] [-P
FILE] [-L
ADDR] [-u
NUM] [-j
ADDR] [-k
DATA] [-y
TYPE] [-w
TOS] [-m
METRIC] [-f
ADDR] [-g
TAG] [-L
ADDR] [-n
MASK] [-h
ADDR] |
DESCRIPTION¶
nemesis
is designed to be a command
line-based, portable human IP stack for UNIX-like and Windows systems. The
suite is broken down by protocol, and should allow for useful scripting of
injected packets from simple shell scripts.
nemesis-ospf
provides an interface to
craft and inject OSPF packets, allowing the the user to specify any portion
of an OSPF packet, as well as lower-lever IP packet information.
OSPF Options¶
-m
METRIC- OSPF Metric
-s
NUM- OSPF Sequence Number
-r
ADDR- OSPF Advertising Router Address
-n
MASK- OSPF Netmask
-o
OPT- OSPF Options, 1 byte value
-R
ADDR- OSPF Source Router ID
-A
ADDR- OSPF Area ID, e.g. 0.0.0.1, default 0.0.0.0
-P
FILE- Filename to read for raw (HEX) OSPF packet payload, appended after
selected packet type. I.e., can be used with
-pU
to create multi LSA Link State Updates. -v
- Display the injected packet in human readable form. Use twice to see a hexdump of the injected package with printable ASCII characters on the right. Use three times for a hexdump without decoded ASCII.
OSPF Packet Types¶
OSPF HELLO options¶
OSPF Database Description (DBD) options¶
OSPF Link State Update (LSU) options¶
OSPF Router LSA options¶
OSPF Autonomous System External LSA options¶
OSPF Network LSA options¶
OSPF Summary LSA (IP Network) options¶
Generic LSA options for LSR and LSU packets¶
IP OPTIONS¶
-S
ADDR- Specify the source address within the IP header.
-D
ADDR- Specify the destination address within the IP header. Defaults to the link-local multicast address 224.0.0.5 (All OSPF Routers).
-F
OPT- Specify the IP header fragmentation options:
IP fragmentation options can be specified individually or combined into a single argument to the
-F
command line switch by separating the options with commas (eg.-FD,M
) or spaces (eg.-FM
223). The IP fragmentation offset is a 13-bit field with valid values from 0 to 8189. Don't fragment (DF), more fragments (MF) and the reserved flag (RESERVED or RB) are 1-bit fields.NOTE: Under normal conditions, the reserved flag is unset.
-I
ID- Specify the IP ID within the IP header.
-O
FILE- This will cause
nemesis-ospf
to use the specified IP options file as the options when building the IP header for the injected packet. IP options can be up to 40 bytes in length. The IP options file must be created manually based upon the desired options. IP options can also be read from stdin by specifying-O-
instead. -S
ADDR- Specify the source IP address within the IP header.
-t
TOS- Specify the IP type of service (TOS) within the IP header. Valid type of
service values:
- 2
- Minimize monetary cost
- 4
- Maximize reliability
- 8
- Maximize throughput
- 24
- Minimize delay
NOTE: Under normal conditions, only one type of service is set within a packet. To specify multiple types, specify the sum of the desired values as the type of service.
-T
TTL- Specify the IP time-to-live (TTL) in the IP header.
DATA LINK OPTIONS¶
-d
IFNAME- Specify the name (for UNIX-like systems) or the number (for Windows systems) of the IFNAME to use (eg. fxp0, eth0, hme0, 1).
-H
MAC- Specify the source MAC address, (XX:XX:XX:XX:XX:XX).
-M
MAC- Specify the destination MAC address, (XX:XX:XX:XX:XX:XX).
-Z
- Lists the available network interfaces by number for use in link-layer
injection.
NOTE: This feature is only relevant to Windows systems.
DIAGNOSTICS¶
nemesis-ospf
returns 0 on a successful
exit, 1 if it exits on an error.
SEE ALSO¶
nemesis-arp(1), nemesis-dhcp(1), nemesis-dns(1), nemesis-ethernet(1), nemesis-icmp(1), nemesis-igmp(1), nemesis-ip(1), nemesis-rip(1), nemesis-tcp(1), nemesis-udp(1).
AUTHORS¶
Mark Grimes
<mark@stateful.net>,
Jeff Nathan
<jeff@snort.org> and
Joachim Nilsson
<troglobit@gmail.com>
BUGS¶
Please report at https://github.com/libnet/nemesis/issues
December 15, 2019 |