ISIC (and components) is intended to test the integrity of an IP Stack and its component stacks (TCP, UDP, ICMP et. al.) It does this by generating a controlled random packet (controlled randomness... wacky huh?). The user can specify he/she/it [I'm tempted to put 'it' before 'she' :-)] wants a stream of TCP packets. He/she/it suspects that the target has weak handling of IP Options (aka Firewall-1). So he/she/it does a 'tcpsic -s rand -d firewall -I100'. And observes the result. A great use for ISIC would be to fire it through a firewall and see if the firewall leaks packets. But of course that would be illegal because Network Associates owns a bogus patent on that :-) You could do that by setting the default route on the sending computer to the firewall..... But that would be illegal. (But I can't legally have a beer so do you think I care about laws?) By far the most common use for these tools is testing IDS systems. A day after I took the source offline and moved it to a cvs server, a half dozen people working on separate home-grown IDS systems emailed requesting the source be put back up.
OS | Architecture | Version |
---|---|---|
NetBSD 10.0 | aarch64 | isic-0.07.tgz |
NetBSD 10.0 | aarch64 | isic-0.07.tgz |
NetBSD 10.0 | aarch64eb | isic-0.07.tgz |
NetBSD 10.0 | aarch64eb | isic-0.07.tgz |
NetBSD 10.0 | alpha | isic-0.07.tgz |
NetBSD 10.0 | alpha | isic-0.07.tgz |
NetBSD 10.0 | earmv4 | isic-0.07.tgz |
NetBSD 10.0 | earmv4 | isic-0.07.tgz |
NetBSD 10.0 | earmv6hf | isic-0.07.tgz |
NetBSD 10.0 | earmv6hf | isic-0.07.tgz |
NetBSD 10.0 | earmv6hf | isic-0.07.tgz |
NetBSD 10.0 | earmv7hf | isic-0.07.tgz |
NetBSD 10.0 | earmv7hf | isic-0.07.tgz |
NetBSD 10.0 | earmv7hf | isic-0.07.tgz |
NetBSD 10.0 | i386 | isic-0.07.tgz |
NetBSD 10.0 | i386 | isic-0.07.tgz |
NetBSD 10.0 | m68k | isic-0.07.tgz |
NetBSD 10.0 | powerpc | isic-0.07.tgz |
NetBSD 10.0 | powerpc | isic-0.07.tgz |
NetBSD 10.0 | powerpc | isic-0.07.tgz |
NetBSD 10.0 | sparc64 | isic-0.07.tgz |
NetBSD 10.0 | sparc64 | isic-0.07.tgz |
NetBSD 10.0 | sparc | isic-0.07.tgz |
NetBSD 10.0 | sparc | isic-0.07.tgz |
NetBSD 10.0 | vax | isic-0.07.tgz |
NetBSD 10.0 | x86_64 | isic-0.07.tgz |
NetBSD 10.0 | x86_64 | isic-0.07.tgz |
NetBSD 9.0 | aarch64 | isic-0.07.tgz |
NetBSD 9.0 | aarch64 | isic-0.07.tgz |
NetBSD 9.0 | alpha | isic-0.07.tgz |
NetBSD 9.0 | alpha | isic-0.07.tgz |
NetBSD 9.0 | earmv6hf | isic-0.07.tgz |
NetBSD 9.0 | earmv6hf | isic-0.07.tgz |
NetBSD 9.0 | earmv6hf | isic-0.07.tgz |
NetBSD 9.0 | earmv7hf | isic-0.07.tgz |
NetBSD 9.0 | earmv7hf | isic-0.07.tgz |
NetBSD 9.0 | earmv7hf | isic-0.07.tgz |
NetBSD 9.0 | i386 | isic-0.07.tgz |
NetBSD 9.0 | i386 | isic-0.07.tgz |
NetBSD 9.0 | m68k | isic-0.07.tgz |
NetBSD 9.0 | powerpc | isic-0.07.tgz |
NetBSD 9.0 | powerpc | isic-0.07.tgz |
NetBSD 9.0 | powerpc | isic-0.07.tgz |
NetBSD 9.0 | sparc64 | isic-0.07.tgz |
NetBSD 9.0 | sparc64 | isic-0.07.tgz |
NetBSD 9.0 | x86_64 | isic-0.07.tgz |
NetBSD 9.0 | x86_64 | isic-0.07.tgz |
NetBSD 9.3 | x86_64 | isic-0.07.tgz |
Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.
The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.
Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.
Problem reports, updates or suggestions for this package should be reported with send-pr.