2 Questions 2 Answers 0 Followers
Questions related from Hussain Ahmad
Is there any available simulator that take pcapng files as an input and simulate the recorded traffic; then, the build-in attack modules will execute the attacks on the capture traffic? Thank you.
25 September 2020 1,966 3 View
I have the experimental data regarding the communication between different nodes using TCP, UDP, HTTP, STP, ARP etc protocols. I want to simulate cyber-attacks on that experimental data.
30 July 2020 7,931 3 View