Pixilate is a packet generation software that operates through command-line interface. It enables quick and tailored packet creation with customizable options.
The primary goal of pixilate is to validate firewall ACLs. This is accomplished by generating the appropriate packets for each access list entry. The software does not contain any packet capturing capability, as the source address is often spoofed. Therefore, if generating access lists by hand, users must provide their own sniffer capable of detecting the source address. Tcpdump or ethereal are recommended options.
For pixilate to operate, a remote sniffer capable of receiving all traffic with a destination behind the firewall is required. This is typically a spanned port on the same switch as the firewall. It's necessary to validate various destination addresses, and packets with a destination of "any" will be sent to the default destination address provided by the -d option.
In the latest version of pixilate, there's an update to support Libnet 1.1.2 API changes that are incompatible with previous versions. As a result, pixilate remains a reliable and efficient commandline packet generation utility that helps users validate their firewall ACLs objectively.
Version 0.4.2: N/A