Egressor checks router configuration.
Egressor comprises of two parts: the test generator and the test receiver. The former is supplied as C source code, while the latter is a PERL script. Both are known to work on LINUX and Solaris. As a public service, the tool is provided subject to the License Agreement. It must be noted that Egressor is not a guarantor of network security – it aims to help information security experts identify possible weaknesses in network configuration. It must be used only with explicit consent from the person responsible for information security, and must not be viewed as a replacement for qualified information security specialists or information security programs tailored to a specific information system.
The client section of Egressor generates messages packets, some spoofed, and sends them to the server section, which listens for these messages and detects the reception of spoofed messages in the stream. A report can then be generated based on the test results, explicitly mentioning the presence or absence of spoofed messages. The software also provides an option for the server to operate indefinitely as a "daemon."
The installation of Egressor requires a GCC compiler, GNU make, and LIBNET to be installed. The users can untar the egressor.tar file by utilizing the command: tar -xvfz egressor.tar.gz. They must also modify the makefile to include the location of LIBNET and execute the command "make" to build the package.
Overall, the Egressor tool may likely benefit many companies in evaluating the configurations of their internet point-of-presence routers, enforcing egress filtering and increasing security mechanism, complying with the guidelines set for Help Defeat Denial of Service Attacks.
Version 1.0: N/A