$ groff -man -Tascii pcat.1 | col -b > manual.txt
PCAT(1) pcat Manual PCAT(1)
NAME
pcat - raw socket necat like tool
SYNOPSIS
tools/pcat [-h] [OPTIONS]
DESCRIPTION
pcat is a tool using the libpcap basic features. For instance, it
allow to reinject raw socket data captured using tcpdump.
OPTIONS
The following options are supported:
-m Mode amongs ping, snif, record, replay (default).
ping send a LDA Version packet (or bit stream with -i)
snif hexadecimal dump (as tcpdump)
record binary dump (as tcpdump -w)
replay re-inject a previous binary dump done with record
-I Interface to use like eth0
-M LDA mac address to use like xx:xx:xx:xx:xx:xx
-Z Host mac address to use (using replay mode)
-t Sleeping time between 2 paquets (using replay mode)
-i Input file
-o Output file
-f Used facility for logging
-s Used severity for logging
-l File to log into
-h Print a short help text describing the supported command-line
options, and then exit.
EXEMPLE
CAPTURE DATA
# ./config polcaldaq.conf -m4 -s
# tcpdump -xx -s 1024 -i eth0 ether host 5e:70:0c:d2:54:fe -w dump.pcap
(now activate triggers via CCC)
RE-INJECT DATA
# ./exemple polcaldaq.conf -i1000 -t100 -d500000 -m4 -S2 -U10 -p eth0
-n
# tools/pcat -I eth0 -M 5e:70:0c:d2:54:fe -Z aa:aa:aa:aa:aa:aa -m
replay -i dump.raw -t 100
BUGS
Please note that "lo" interface didn't accept to replay packets and
unlinked ethernet card too. So you should use an existing ethernet
interface linked to wathever other host in order to reinject packets
using the pcat tool.
REPORTING BUGS
Please send a report to nicolas.roche@llr.in2p3.fr
AUTHORS
Nicolas Roche, David Decotigny.
LICENCE
This software is released under the GNU General Public License. Please
read the COPYING file for more information.
SEE ALSO
The full documentation for libLDA is maintained as a Latex2Html
intranet. If a browser is installed at your site, the URL
<http://polype/~roche/calicei/> should give you access to the complete
manual.
libLDA(5), calDump(1)
Version 1.0 August 16, 2011 PCAT(1)
|