1tcprewrite(1) User Commands tcprewrite(1)
2
3
4
6 tcprewrite - Rewrite the packets in a pcap file.
7
9 tcprewrite [-flags] [-flag [value]] [--option-name[[=| ]value]]
10
11 All arguments must be options.
12
13
15 Tcprewrite is a tool to rewrite packets stored in pcap(3) file format,
16 such as created by tools such as tcpdump(1) and wireshark(1). Once a
17 pcap file has had it's packets rewritten, they can be replayed back out
18 on the network using tcpreplay(1).
19
20 tcprewrite currently supports reading the following DLT types:
21
22 DLT_C_HDLC aka Cisco HDLC
23
24 DLT_EN10MB aka Ethernet
25
26 DLT_LINUX_SLL aka Linux Cooked Socket
27
28 DLT_RAW aka RAW IP
29
30 DLT_NULL aka BSD Loopback
31
32 DLT_LOOP aka OpenBSD Loopback
33
34 DLT_IEEE802_11 aka 802.11a/b/g
35
36 DLT_IEEE802_11_RADIO aka 802.11a/b/g with Radiotap headers
37
38 DLT_JUNIPER_ETHER aka Juniper Encapsulated Ethernet
39
40 DLT_PPP_SERIAL aka PPP over Serial
41
42 Please see the --dlt option for supported DLT types for writing.
43
44 The packet editing features of tcprewrite which distinguish between
45 "client" and "server" traffic requires a tcpprep(1) cache file.
46
47 For more details, please see the Tcpreplay Manual at: http://tcpre‐
48 play.appneta.com
49
51
52 -r string, --portmap=string
53 Rewrite TCP/UDP ports. This option may appear up to 9999 times.
54
55 Specify a list of comma delimited port mappings consisting of
56 colon delimited port number pairs. Each colon delimited port
57 pair consists of the port to match followed by the port number
58 to rewrite.
59
60 Examples:
61 --portmap=80:8000 --portmap=8080:80 # 80->8000 and 8080->80
62 --portmap=8000,8080,88888:80 # 3 different ports become 80
63 --portmap=8000-8999:80 # ports 8000 to 8999 become 80
64
65 -s number, --seed=number
66 Randomize src/dst IPv4/v6 addresses w/ given seed. This option
67 may appear up to 1 times. This option must not appear in combi‐
68 nation with any of the following options: fuzz-seed. This op‐
69 tion takes an integer number as its argument.
70
71 Causes the source and destination IPv4/v6 addresses to be pseudo
72 randomized but still maintain client/server relationships.
73 Since the randomization is deterministic based on the seed, you
74 can reuse the same seed value to recreate the traffic.
75
76 -N string, --pnat=string
77 Rewrite IPv4/v6 addresses using pseudo-NAT. This option may ap‐
78 pear up to 2 times. This option must not appear in combination
79 with any of the following options: srcipmap.
80
81 Takes a comma delimited series of colon delimited CIDR netblock
82 pairs. Each netblock pair is evaluated in order against the IP
83 addresses. If the IP address in the packet matches the first
84 netblock, it is rewritten using the second netblock as a mask
85 against the high order bits.
86
87 IPv4 Example:
88 --pnat=192.168.0.0/16:10.77.0.0/16,172.16.0.0/12:10.1.0.0/24
89 IPv6 Example:
90 --pnat=[2001:db8::/32]:[dead::/16],[2001:db8::/32]:[::ffff:0:0/96]
91
92 -S string, --srcipmap=string
93 Rewrite source IPv4/v6 addresses using pseudo-NAT. This option
94 may appear up to 1 times. This option must not appear in combi‐
95 nation with any of the following options: pnat.
96
97 Works just like the --pnat option, but only affects the source
98 IP addresses in the IPv4/v6 header.
99
100 -D string, --dstipmap=string
101 Rewrite destination IPv4/v6 addresses using pseudo-NAT. This
102 option may appear up to 1 times. This option must not appear in
103 combination with any of the following options: pnat.
104
105 Works just like the --pnat option, but only affects the destina‐
106 tion IP addresses in the IPv4/v6 header.
107
108 -e string, --endpoints=string
109 Rewrite IP addresses to be between two endpoints. This option
110 may appear up to 1 times. This option must appear in combina‐
111 tion with the following options: cachefile.
112
113 Takes a pair of colon delimited IPv4/v6 addresses which will be
114 used to rewrite all traffic to appear to be between the two IP
115 addresses.
116
117 IPv4 Example:
118 --endpoints=172.16.0.1:172.16.0.2
119 IPv6 Example:
120 --endpoints=[2001:db8::dead:beef]:[::ffff:0:0:ac:f:0:2]
121
122 --tcp-sequence=number
123 Change TCP Sequence (and ACK) numbers /w given seed. This op‐
124 tion takes an integer number as its argument. The value of num‐
125 ber is constrained to being:
126 greater than or equal to 1
127 The default number for this option is:
128 0
129
130 Change all TCP sequence numbers, and related sequence-acknowl‐
131 edgement numbers. They will be shifted by a random amount based
132 on the provided seed.
133
134 -b, --skipbroadcast
135 Skip rewriting broadcast/multicast IPv4/v6 addresses.
136
137 By default --seed, --pnat and --endpoints will rewrite broadcast
138 and multicast IPv4/v6 and MAC addresses. Setting this flag will
139 keep broadcast/multicast IPv4/v6 and MAC addresses from being
140 rewritten.
141
142 -C, --fixcsum
143 Force recalculation of IPv4/TCP/UDP header checksums.
144
145 Causes each IPv4/v6 packet to have their checksums recalculated
146 and fixed. Automatically enabled for packets modified with
147 --seed, --pnat, --endpoints or --fixlen.
148
149 -m number, --mtu=number
150 Override default MTU length (1500 bytes). This option may ap‐
151 pear up to 1 times. This option takes an integer number as its
152 argument. The value of number is constrained to being:
153 in the range 1 through MAX_SNAPLEN
154
155 Override the default 1500 byte MTU size for determining the max‐
156 imum padding length (--fixlen=pad) or when truncating (--mtu-
157 trunc).
158
159 --mtu-trunc
160 Truncate packets larger then specified MTU. This option may ap‐
161 pear up to 1 times.
162
163 Similar to --fixlen, this option will truncate data in packets
164 from Layer 3 and above to be no larger then the MTU.
165
166 -E, --efcs
167 Remove Ethernet checksums (FCS) from end of frames.
168
169 Note, this option is pretty dangerous! We do not actually check
170 to see if a FCS actually exists in the frame, we just blindly
171 delete the last 4 bytes. Hence, you should only use this if you
172 know know that your OS provides the FCS when reading raw pack‐
173 ets.
174
175 --ttl=string
176 Modify the IPv4/v6 TTL/Hop Limit.
177
178 Allows you to modify the TTL/Hop Limit of all the IPv4/v6 pack‐
179 ets. Specify a number to hard-code the value or +/-value to in‐
180 crease or decrease by the value provided (limited to 1-255).
181
182 Examples:
183 --ttl=10
184 --ttl=+7
185 --ttl=-64
186
187 --tos=number
188 Set the IPv4 TOS/DiffServ/ECN byte. This option may appear up
189 to 1 times. This option takes an integer number as its argu‐
190 ment. The value of number is constrained to being:
191 in the range 0 through 255
192
193 Allows you to override the TOS (also known as DiffServ/ECN)
194 value in IPv4.
195
196 --tclass=number
197 Set the IPv6 Traffic Class byte. This option may appear up to 1
198 times. This option takes an integer number as its argument.
199 The value of number is constrained to being:
200 in the range 0 through 255
201
202 Allows you to override the IPv6 Traffic Class field.
203
204 --flowlabel=number
205 Set the IPv6 Flow Label. This option may appear up to 1 times.
206 This option takes an integer number as its argument. The value
207 of number is constrained to being:
208 in the range 0 through 1048575
209
210 Allows you to override the 20bit IPv6 Flow Label field. Has no
211 effect on IPv4 packets.
212
213 -F string, --fixlen=string
214 Pad or truncate packet data to match header length. This option
215 may appear up to 1 times.
216
217 Packets may be truncated during capture if the snaplen is
218 smaller then the packet. This option allows you to modify the
219 packet to pad the packet back out to the size stored in the
220 IPv4/v6 header or rewrite the IP header total length to reflect
221 the stored packet length.
222
223 pad Truncated packets will be padded out so that the packet
224 length matches the IPv4 total length
225
226 trunc Truncated packets will have their IPv4 total length field
227 rewritten to match the actual packet length
228
229 del Delete the packet
230
231 --fuzz-seed=number
232 Fuzz 1 in X packets. Edit bytes, length, or emulate packet drop.
233 This option takes an integer number as its argument. The value
234 of number is constrained to being:
235 greater than or equal to 0
236 The default number for this option is:
237 0
238
239 This fuzzing was designed as to test layer 7 protocols such as
240 voip protocols. It modifies randomly 1 out of X packets (where
241 X = --fuzz-factor) in order for stateful protocols to cover more
242 of their code. The random fuzzing actions focus on data start
243 and end because it often is the part of the data application
244 protocols base their decisions on.
245
246 Possible fuzzing actions list:
247 * drop packet
248 * reduce packet size
249 * edit packet Bytes:
250 * Not all Bytes have the same probability of appearance in
251 real life.
252 Replace with 0x00, 0xFF, or a random byte with equal like‐
253 lihood.
254 * Not all Bytes have the same significance in a packet.
255 Replace the start, the end, or the middle of the packet
256 with equal likelihood.
257 * do nothing (7 out of 8 packets)
258
259 --fuzz-factor=number
260 Set the Fuzz 1 in X packet ratio (default 1 in 8 packets). This
261 option must appear in combination with the following options:
262 fuzz-seed. This option takes an integer number as its argument.
263 The value of number is constrained to being:
264 greater than or equal to 1
265 The default number for this option is:
266 8
267
268 Sets the ratio of for --fuzz-seed option. By default this value
269 is 8, which means 1 in 8 packets are modified by fuzzing. Note
270 that this ratio is based on the random number generated by the
271 supplied fuzz seed. Therefore by default you cannot expect that
272 exactly every eighth packet will be modified.
273
274 --skipl2broadcast
275 Skip rewriting broadcast/multicast Layer 2 addresses.
276
277 By default, editing Layer 2 addresses will rewrite broadcast and
278 multicast MAC addresses. Setting this flag will keep broad‐
279 cast/multicast MAC addresses from being rewritten.
280
281 --dlt=string
282 Override output DLT encapsulation. This option may appear up to
283 1 times.
284
285 By default, no DLT (data link type) conversion will be made. To
286 change the DLT type of the output pcap, select one of the fol‐
287 lowing values:
288
289 enet Ethernet aka DLT_EN10MB
290
291 hdlc Cisco HDLC aka DLT_C_HDLC
292
293 jnpr_eth Juniper Ethernet DLT_C_JNPR_ETHER
294
295 pppserial PPP Serial aka DLT_PPP_SERIAL
296
297 user User specified Layer 2 header and DLT type
298
299 --enet-dmac=string
300 Override destination ethernet MAC addresses. This option may
301 appear up to 1 times.
302
303 Takes a pair of comma deliminated ethernet MAC addresses which
304 will replace the destination MAC address of outbound packets.
305 The first MAC address will be used for the server to client
306 traffic and the optional second MAC address will be used for the
307 client to server traffic.
308
309 Example:
310 --enet-dmac=00:12:13:14:15:16,00:22:33:44:55:66
311
312 --enet-smac=string
313 Override source ethernet MAC addresses. This option may appear
314 up to 1 times.
315
316 Takes a pair of comma deliminated ethernet MAC addresses which
317 will replace the source MAC address of outbound packets. The
318 first MAC address will be used for the server to client traffic
319 and the optional second MAC address will be used for the client
320 to server traffic.
321
322 Example:
323 --enet-smac=00:12:13:14:15:16,00:22:33:44:55:66
324
325 --enet-subsmac=string
326 Substitute MAC addresses. This option may appear up to 9999
327 times.
328
329 Allows you to rewrite ethernet MAC addresses of packets. It
330 takes comma delimited pair or MACs address and rewrites all oc‐
331 currences of the first MAC with the value of the second MAC.
332 Example:
333 --enet-subsmac=00:12:13:14:15:16,00:22:33:44:55:66
334
335 --enet-mac-seed=number
336 Randomize MAC addresses. This option may appear up to 1 times.
337 This option must not appear in combination with any of the fol‐
338 lowing options: enet-smac, enet-dmac, enet-subsmac. This option
339 takes an integer number as its argument.
340
341 Allows you to randomize ethernet MAC addresses of packets,
342 mostly like what --seed option does for IPv4/IPv6 addresses.
343
344 --enet-mac-seed-keep-bytes=number
345 Randomize MAC addresses. This option may appear up to 1 times.
346 This option must appear in combination with the following op‐
347 tions: enet-mac-seed. This option takes an integer number as
348 its argument. The value of number is constrained to being:
349 in the range 1 through 6
350
351 Keep some bytes untouched when usinging --enet-mac-seed option.
352
353 --enet-vlan=string
354 Specify ethernet 802.1q VLAN tag mode. This option may appear
355 up to 1 times.
356
357 Allows you to rewrite ethernet frames to add a 802.1q header to
358 standard 802.3 ethernet headers or remove the 802.1q VLAN tag
359 information.
360
361 add Adds an 802.1q VLAN header to the existing 802.3 ethernet
362 header. If a VLAN header already exists, a new VLAN header is
363 added outside of the existing header.
364
365 Note that you will be allowed to run this option multiple times
366 to create more than 2 VLAN headers, however those packets will
367 be valid. At most you should have 2 X 802.1q VLAN tags, or outer
368 an 802.1ad and an inner 802.1q VLAN tag.
369
370 del Rewrites the existing 802.1q VLAN header as an 802.3 ether‐
371 net header
372
373 --enet-vlan-tag=number
374 Specify the new ethernet 802.1q VLAN tag value. This option may
375 appear up to 1 times. This option must appear in combination
376 with the following options: enet-vlan. This option takes an in‐
377 teger number as its argument. The value of number is con‐
378 strained to being:
379 in the range 0 through 4095
380
381
382 --enet-vlan-cfi=number
383 Specify the ethernet 802.1q VLAN CFI value. This option may ap‐
384 pear up to 1 times. This option must appear in combination with
385 the following options: enet-vlan. This option takes an integer
386 number as its argument. The value of number is constrained to
387 being:
388 in the range 0 through 1
389
390
391 --enet-vlan-pri=number
392 Specify the ethernet 802.1q VLAN priority. This option may ap‐
393 pear up to 1 times. This option must appear in combination with
394 the following options: enet-vlan. This option takes an integer
395 number as its argument. The value of number is constrained to
396 being:
397 in the range 0 through 7
398
399
400 --enet-vlan-proto=string
401 Specify VLAN tag protocol 802.1q or 802.1ad. This option may
402 appear up to 1 times.
403
404 Allows you to specify the protocol of the added VLAN tags.
405
406 802.1q Specifies that 802.1q VLAN headers are to be added. This
407 is the default.
408
409 802.1ad Specifies that 802.1ad Q-in-Q VLAN headers are to be
410 added. To make valid packets, input packets must already have
411 802.1q VLAN headers.
412
413 --hdlc-control=number
414 Specify HDLC control value. This option may appear up to 1
415 times. This option takes an integer number as its argument.
416
417 The Cisco HDLC header has a 1 byte "control" field. Apparently
418 this should always be 0, but if you can use any 1 byte value.
419
420 --hdlc-address=number
421 Specify HDLC address. This option may appear up to 1 times.
422 This option takes an integer number as its argument.
423
424 The Cisco HDLC header has a 1 byte "address" field which has two
425 valid values:
426
427 0x0F Unicast
428
429 0xBF Broadcast
430 You can however specify any single byte value.
431
432 --user-dlt=number
433 Set output file DLT type. This option may appear up to 1 times.
434 This option takes an integer number as its argument.
435
436 Set the DLT value of the output pcap file.
437
438 --user-dlink=string
439 Rewrite Data-Link layer with user specified data. This option
440 may appear up to 2 times.
441
442 Provide a series of comma deliminated hex values which will be
443 used to rewrite or create the Layer 2 header of the packets.
444 The first instance of this argument will rewrite both server and
445 client traffic, but if this argument is specified a second time,
446 it will be used for the client traffic.
447
448 Example:
449 --user-dlink=01,02,03,04,05,06,00,1A,2B,3C,4D,5E,6F,08,00
450
451 -d number, --dbug=number
452 Enable debugging output. This option may appear up to 1 times.
453 This option takes an integer number as its argument. The value
454 of number is constrained to being:
455 in the range 0 through 5
456 The default number for this option is:
457 0
458
459 If configured with --enable-debug, then you can specify a ver‐
460 bosity level for debugging output. Higher numbers increase ver‐
461 bosity.
462
463 -i string, --infile=string
464 Input pcap file to be processed. This option may appear up to 1
465 times.
466
467
468 -o string, --outfile=string
469 Output pcap file. This option may appear up to 1 times.
470
471
472 -c string, --cachefile=string
473 Split traffic via tcpprep cache file. This option may appear up
474 to 1 times.
475
476 Use tcpprep cache file to split traffic based upon client/server
477 relationships.
478
479 -v, --verbose
480 Print decoded packets via tcpdump to STDOUT. This option may
481 appear up to 1 times.
482
483
484 -A string, --decode=string
485 Arguments passed to tcpdump decoder. This option may appear up
486 to 1 times. This option must appear in combination with the
487 following options: verbose.
488
489 When enabling verbose mode (-v) you may also specify one or more
490 additional arguments to pass to tcpdump to modify the way pack‐
491 ets are decoded. By default, -n and -l are used. Be sure to
492 quote the arguments so that they are not interpreted by
493 tcprewrite. Please see the tcpdump(1) man page for a complete
494 list of options.
495
496 --fragroute=string
497 Parse fragroute configuration file. This option may appear up
498 to 1 times.
499
500 Enable advanced evasion techniques using the built-in fra‐
501 groute(8) engine. See the fragroute(8) man page for more de‐
502 tails. Important: tcprewrite does not support the delay, echo
503 or print commands.
504
505 --fragdir=string
506 Which flows to apply fragroute to: c2s, s2c, both. This option
507 may appear up to 1 times. This option must appear in combina‐
508 tion with the following options: cachefile.
509
510 Apply the fragroute engine to packets going c2s, s2c or both
511 when using a cache file.
512
513 --skip-soft-errors
514 Skip writing packets with soft errors. This option may appear
515 up to 1 times.
516
517 In some cases, packets can not be decoded or the requested edit‐
518 ing is not possible. Normally these packets are written to the
519 output file unedited so that tcpprep cache files can still be
520 used, but if you wish, these packets can be suppressed.
521
522 One example of this is 802.11 management frames which contain no
523 data.
524
525 -V, --version
526 Print version information.
527
528
529 -h, --less-help
530 Display less usage information and exit.
531
532
533 -H, --help
534 Display usage information and exit.
535
536 -!, --more-help
537 Pass the extended usage information through a pager.
538
539 --save-opts [=cfgfile]
540 Save the option state to cfgfile. The default is the last con‐
541 figuration file listed in the OPTION PRESETS section, below.
542 The command will exit after updating the config file.
543
544 --load-opts=cfgfile, --no-load-opts
545 Load options from cfgfile. The no-load-opts form will disable
546 the loading of earlier config/rc/ini files. --no-load-opts is
547 handled early, out of order.
548
550 Any option that is not marked as not presettable may be preset by load‐
551 ing values from configuration ("RC" or ".INI") file(s). The homerc
552 file is "$$/", unless that is a directory. In that case, the file
553 ".tcprewriterc" is searched for within that directory.
554
556 See OPTION PRESETS for configuration files.
557
559 One of the following exit values will be returned:
560
561 0 (EXIT_SUCCESS)
562 Successful program execution.
563
564 1 (EXIT_FAILURE)
565 The operation failed or the command syntax was not valid.
566
567 66 (EX_NOINPUT)
568 A specified configuration file could not be loaded.
569
570 70 (EX_SOFTWARE)
571 libopts had an internal operational error. Please report it to
572 autogen-users@lists.sourceforge.net. Thank you.
573
575 Copyright 2013-2022 Fred Klassen - AppNeta Copyright 2000-2012 Aaron
576 Turner For support please use the tcpreplay-users@lists.sourceforge.net
577 mailing list. The latest version of this software is always available
578 from: http://tcpreplay.appneta.com/
579
581 Copyright (C) 2000-2022 Aaron Turner and Fred Klassen all rights re‐
582 served. This program is released under the terms of the GNU General
583 Public License, version 3 or later.
584
586 Please send bug reports to: tcpreplay-users@lists.sourceforge.net
587
589 This manual page was AutoGen-erated from the tcprewrite option defini‐
590 tions.
591
592
593
594tcprewrite 01 Jan 2023 tcprewrite(1)