Linux - SoftwareThis forum is for Software issues.
Having a problem installing a new program? Want to know which application is best for the job? Post your question in this forum.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
they want to attack someones network by pushing captured packets to a remote network and replaying them so they think they are true neighbours and get them to route through the wormhole.
Bad route, so poor performance, and also bad as attacker has many more packets to sniff.
they want to attack someones network by pushing captured packets to a remote network and replaying them so they think they are true neighbours and get them to route through the wormhole. Bad route, so poor performance, and also bad as attacker has many more packets to sniff.
Maybe, or they could be asking about NS2. Can't tell by what's been posted.
HI
actually im using NS 2.35 in ubuntu...and i want to implement worm hole attack. I know how to implement this scenario in tcl and awk scripts and i want to know whether it is possible to modify or create any CC file for the same.
thanks for your answer.
I did follow all the steps. I have donlowded the attack module from : http://web.njit.edu/~crix/software/wormhole.html
So I modified the fils arp.cc, ll.cc and ll.h in /../ns-allinone-2.35/ns-2.35/mac.
then, I did sudo ./configure, sudo make clean, sudo make
But when I execute my script the following error message appears:
ns: _o171 wormhole-peer:
(_o171 cmd line 1)
invoked from within
"_o171 cmd wormhole-peer"
invoked from within
"catch "$self cmd $args" ret"
invoked from within
"if [catch "$self cmd $args" ret] {
set cls [$self info class]
global errorInfo
set savedInfo $errorInfo
error "error when calling class $cls: $args" $..."
(procedure "_o171" line 2)
(SplitObject unknown line 2)
invoked from within
"_o171 wormhole-peer"
Please, I need your help
thanks in advance
...
The module was developed for version 2.27 of ns2. The archive contains a directory with the original ns2 files (orig-ns-2.27) and a directory with the modified files for the attack module (odsbr-ns-2.27).
but I compared the files of the too versions of ns2(2.27 and 2.35)in mac. there is only one différence in the path and i changed it.
is there any solution to simulate wormhole in ns2.35?
Distribution: PCLinuxOS2023 Fedora38 + 50+ other Linux OS, for test only.
Posts: 17,511
Rep:
# 13 .
Why use ns-2.35 ?
All ns-2.27 ... ns-2.34 are easy to build with any 32bits Linux OS.
About "attack_module.tar" from http://web.njit.edu/~crix/software/wormhole.html :
The first thing to do is always to test with the version it was meant for → ns-2.27.
With some of the usual file edits added, it might work :
ns-2.27/common/packet.h
ns-2.27/tcl/lib/{ns-<??>.tcl, ns-packet.tcl, etc.}
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.