


NEMESIS-ETHERNET(1)			      NEMESIS-ETHERNET(1)


NAME
       nemesis-ethernet - Ethernet Protocol (The Nemesis Project)

SYNOPSIS
       nemesis-ethernet [-v?] [-d Ethernet-device ]  [-H  source-
       MAC-address  ]  [-M destination-MAC-address ] [-P payload-
       file ] [-T Ethernet-type ]

DESCRIPTION
       The Nemesis Project is designed	to  be	a  command  line-
       based, portable human IP stack for UNIX like systems.  The
       suite is broken down by protocol,  and  should  allow  for
       useful  scripting  of  injected packet streams from simple
       shell scripts.

       nemesis-ethernet provides an interface to craft and inject
       Ethernet	 frames	 allowing  the user to inject an entirely
       arbitrary Ethernet frame.

ETHERNET OPTIONS
       -d Ethernet-device
	      Specify the name of  Ethernet-device  to	use  (eg.
	      ne0, fxp0, eth0).

       -H source-MAC-address
	      Specify the source-MAC-address (XX:XX:XX:XX:XX:XX).

       -M destination-MAC-address
	      Specify	      the	   destintion-MAC-address
	      (XX:XX:XX:XX:XX:XX).

       -P payload-file
	      This  will cause nemesis-ethernet to use the speci-
	      fied payload-file as  the	 payload  when	injecting
	      Ethernet	frames.	 The maximum payload size is 1500
	      bytes in order to account for the maximum	 Ethernet
	      frame  size.   Payloads can also be read from stdin
	      by specifying '-P -' instead of a payload-file.

	      The payload file can consist of any  arbitary  data
	      though  it  will be most useful to create a payload
	      resembling the structure of a packet type not  sup-
	      ported  by nemesis.  Used in this manner, virtually
	      any link layer frame can be injected.

       -T Ethernet-type
	      Specify the Ethernet-type	 as  an	 integer.   Valid
	      Ethernet types include:

	      512   (PUP)
	      2048  (IP)
	      2054  (ARP)
	      32821 (RARP)
	      33024 (802.1q)



			   16 June 2002				1





NEMESIS-ETHERNET(1)			      NEMESIS-ETHERNET(1)


	      34525 (IPV6)
	      34916 (PPPOE discovery)
	      34916 (PPPOE session)

       -v verbose-mode
	      Display the injected packet in human readable form.
	      Use twice to see a hexdump of the injected  packet.

DIAGNOSTICS
       Nemesis-ethernet	 returns  0 on a successful exit, 1 if it
       exits on an error.

BUGS
       Send  concise  and  clearly   written   bug   reports   to
       jeff@snort.org

AUTHOR
       Jeff Nathan <jeff@snort.org>

SEE ALSO
       nemesis-arp(1),	nemesis-dns(1), nemesis-icmp(1), nemesis-
       igmp(1), nemesis-ip(1),	nemesis-ospf(1),  nemesis-rip(1),
       nemesis-tcp(1),


































			   16 June 2002				2


