Skip to content
This repository

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
Browse code

Markdownify README

  • Loading branch information...
commit 92446b155aa72aebd600a5a8911078c1cdde9e79 1 parent 27c51ed
Michael Santos authored

Showing 1 changed file with 14 additions and 16 deletions. Show diff stats Hide diff stats

  1. +14 16 README → README.md
30 README → README.md
Source Rendered
... ... @@ -1,4 +1,3 @@
1   -
2 1 herp re-writes ethernet headers, thereby acting as a user space bridge.
3 2 Right now, herp works on switched networks and forwards any packets that
4 3 have been sent to the host from ARP spoofing.
@@ -6,23 +5,23 @@ have been sent to the host from ARP spoofing.
6 5 In the future, herp will probably become a real, although slow, bridge.
7 6
8 7
9   -EXPORTS
  8 +# EXPORTS
10 9
11   -start() -> {ok, PID}
12   -start(Device) -> {ok, PID}
  10 + start() -> {ok, PID}
  11 + start(Device) -> {ok, PID}
13 12
14   - Types Device = string()
  13 + Types Device = string()
15 14
16   - Device is the network interface name.
  15 + Device is the network interface name.
17 16
18 17
19   -HOW TO USE IT
  18 +# HOW TO USE IT
20 19
21   -> herp:start(). % start up the bridge
22   -> farp:start().
  20 + > herp:start(). % start up the bridge
  21 + > farp:start().
23 22
24 23
25   -TODO
  24 +# TODO
26 25
27 26 * test bridging between networks
28 27
@@ -33,13 +32,13 @@ the gateway may respond directly to the target if the gateway's ARP
33 32 cache still holds the valid MAC address of the target. Force the gateway
34 33 to respond to the bridge by:
35 34
36   -- arp'ing an unused IP address with the bridge's MAC address
  35 + * arp'ing an unused IP address with the bridge's MAC address
37 36
38   -- mapping the fake IP (and maybe a fake source port) to the target
  37 + * mapping the fake IP (and maybe a fake source port) to the target
39 38
40   -- re-write the source IP and port header from the response to the
41   - bridge's MAC address/gateway's IP address with the target's MAC/IP as
42   - the destination
  39 + * re-write the source IP and port header from the response to the
  40 + bridge's MAC address/gateway's IP address with the target's MAC/IP as
  41 + the destination
43 42
44 43 The gateway will respond to the bridge's MAC address. The bridge OS
45 44 won't respond to the packets (e.g., send a RST) because the IP is not
@@ -49,4 +48,3 @@ target host and re-write the MAC and IP headers.
49 48 Instead of looking up the map in an ets table or a data structure, state
50 49 could even be kept by having each source IP/port spawn a new process
51 50 (a gen_fsm) registered with the source IP/port.
52   -

0 comments on commit 92446b1

Please sign in to comment.
Something went wrong with that request. Please try again.