#137 inject.after-packet is not implemented properly

开启中
jens.klein6 年之前创建 · 0 条评论

This leads to inject.after-packet being available for nearly every attack, but never used within these attacks.

Implementing it requires a timestamp extraction for individual packets, which are not and can not be stored in the database due to the amount of data it is. So an efficient way to go through all packets in a pcap is needed to get the required timestamp and set it as inject.at-timestamp parameter.

This leads to inject.after-packet being available for nearly every attack, but never used within these attacks. Implementing it requires a timestamp extraction for individual packets, which are not and can not be stored in the database due to the amount of data it is. So an efficient way to go through all packets in a pcap is needed to get the required timestamp and set it as inject.at-timestamp parameter.
登录 并参与到对话中。
未选择标签
Bug
未选择里程碑
未指派成员
1 名参与者
正在加载...
取消
保存
这个人很懒,什么都没留下。