TestPromiscuousMode Class Reference
[Available test cases]

Inheritance diagram for TestPromiscuousMode:

TestCase TestUnit TestConfigurationContainer

List of all members.


Detailed Description

Scenario: promiscuous mode attack.

This test runs the exploits against tcpdump, Snort, Wireshark, and Ethereal which are available on milw0rm.org.

test1: milw0rm exploit #171 - tcpdump ISAKMP Identification payload Integer Overflow Exploit [2004-04-05] test2: milw0rm exploit #956 - Ethereal / tcpdump (rsvp_print) Infinite Loop Denial of Service Exploit [2005-04-26] test3: milw0rm exploit #957 - Tcpdump 3.8.x (ldp_print) Infinite Loop Denial of Service Exploit [2005-04-26] test4: milw0rm exploit #958 - Tcpdump 3.8.x (rt_routing_info) Infinite Loop Denial of Service Exploit [2005-04-26] test5: milw0rm exploit #959 - Tcpdump 3.8.x/3.9.1 (isis_print) Infinite Loop DoS Exploit [2005-04-26] test6: milw0rm exploit #1037 - Tcpdump bgp_update_print Remote Denial of Service Exploit [2005-06-09]

test7: milw0rm exploit #490 - linux/x86 kill snort 151 bytes [2004-09-26] test8: milw0rm exploit #706 - Snort <= 2.2.10 Remote Denial of Service Exploit [2004-12-22] test9: milw0rm exploit #1213 - Snort <= 2.4.0 SACK TCP Option Error Handling Denial of Service Exploit [2005-09-12] test10: milw0rm exploit #1313 - Snort <= 2.4.2 Back Orifice Pre-Preprocessor Remote Exploit (3) [2005-11-11] test11: milw0rm exploit #3362 - Snort 2.6.1 DCE/RPC Preprocessor Remote Buffer Overflow DoS Exploit [2007-02-23] test12: milw0rm exploit #3434 - Snort 2.6.1.1/2.6.1.2/2.7.0 (fragementation) Remote DoS Exploit [2007-03-08] (MAC address of target needed) test13: milw0rm exploit #3609 - Snort 2.6.1 DCE/RPC Preprocessor Remote Buffer Overflow Exploit (linux) [2007-03-30]

test14: milw0rm exploit #4347 - Wireshark < 0.99.5 DNP3 Dissector Infinite Loop Exploit [2007-08-31]

test15: milw0rm exploit #167 - Ethereal 0.10.0-0.10.2 IGAP Overflow Remote Root Exploit [2004-03-28] test16: milw0rm exploit #170 - Ethereal EIGRP Dissector TLV_IP_INT Long IP Remote DoS Exploit [2004-04-04] test17: milw0rm exploit #878 - Ethereal <= 0.10.9 "3G-A11" Remote Buffer Overflow Exploit [2005-03-14] test18: milw0rm exploit #984 - Ethereal <= 0.10.10 (dissect_ipc_state) Remote Denial of Service Exploit [2005-05-07] test19: milw0rm exploit #1021 - Ethereal <= 0.10.10 (SIP) Protocol Dissector Remote BoF Exploit [2005-05-31] test20: milw0rm exploit #1139 - Ethereal 10.x AFP Protocol Dissector Remote Format String Exploit [2005-08-06] test21: milw0rm exploit #1266 - Ethereal 0.9.1 - 0.10.12 SLIMP3 Remote Buffer Overflow PoC [2005-10-20]

Definition at line 44 of file TestPromiscuousMode.py.


Public Member Functions

def initTestCase
 This function is called by the __init__ function from the parent.
def test
 implementation of promiscuous mode attack

Member Function Documentation

def initTestCase (   self  ) 

This function is called by the __init__ function from the parent.

Don't define your own __init__ here!

Reimplemented from TestCase.

Definition at line 51 of file TestPromiscuousMode.py.

def test (   self  ) 

implementation of promiscuous mode attack

Reimplemented from TestCase.

Definition at line 61 of file TestPromiscuousMode.py.


The documentation for this class was generated from the following file:

Generated on Mon Aug 11 17:28:36 2008 for TestEnv by  doxygen 1.5.5