Calling the attack
Dustin Born edited this page 6 years ago

Seeding

To inject a Membership Management Communication Attack, call ID2T e.g. like so:

./id2t -i input_file -a MembersMgmtCommAttack [parameters]

If desired, a seed for the randomization used within the program can be specified e.g. like so:

./id2t -i input_file --seed 42 -a MembersMgmtCommAttack [parameters]

The seed can also be a string:

./id2t -i input_file --seed "Hello World" -a MembersMgmtCommAttack [parameters]

Injecting into an Empty PCAP

It is also possible to inject into an empty PCAP file, using the statistics of the input PCAP. The required flag is -ie or --inject_empty

./id2t -i input_file -ie -a MembersMgmtCommAttack [parameters]
./id2t -i input_file --inject_empty -a MembersMgmtCommAttack [parameters]

Specifying an Output File Name

Another new feature is that one can specify the (base) name of the output file(s). If the specified name has a different extension than .pcap, the base name includes the given extension. For example when calling:

./id2t -i input_file -o output_file.pcap -a MembersMgmtCommAttack [parameters]
./id2t -i input_file -o output_file -a MembersMgmtCommAttack [parameters]

The output PCAP is called output_file.pcap.

But if one calls ID2T like this:

./id2t -i input_file --output output_file.jpg -a MembersMgmtCommAttack [parameters]

The output PCAP is called output_file.jpg.pcap.