faked-tcp
Simulate TCP connections for testing purposes
SYNOPSIS
faked-tcp [-i interface] [-s src_ip] [-d dst_ip] [-p port] [-t type] [--help]
PARAMETERS
-i
Specify network interface for packet injection
-s
Fake source IP address
-d
Destination IP address
-p
Target TCP port
-t
TCP packet type (SYN, ACK, RST, etc.)
--help
Show usage information
DESCRIPTION
faked-tcp is not a standard Linux command included in major distributions like Ubuntu, Fedora, or Debian base repositories. No man page or official documentation exists for it in common package managers (apt, yum/dnf, pacman). It appears to be a custom or niche utility, possibly from security testing toolkits, penetration testing environments (e.g., Kali Linux add-ons), or user scripts designed to forge TCP packets, simulate connections, or disrupt TCP sessions.
Such tools are typically used for network testing, fuzzing firewalls/IDS, or demonstrating TCP vulnerabilities like SYN floods or RST injection. Without a verified source, exact behavior is unknown, but similar to hping3 or nmap's scripting engine, it might craft malformed TCP headers to fake handshakes or terminate sessions. Usage could involve specifying IP/port targets and packet parameters.
Caution: Running unverified tools risks system compromise or legal issues if misused for attacks. Verify origin via which faked-tcp, ldd faked-tcp, or source code. For legitimate testing, prefer established tools.
CAVEATS
Not standard; may require root privileges, raw sockets (needs CAP_NET_RAW). Potential for network disruption or detection as malicious. Unverified binaries pose security risks. Legal use only for authorized testing.
ALTERNATIVES
Use hping3 --syn -p 80 target for SYN floods; scapy for Python-scripted TCP faking.
DETECTION
Monitor with tcpdump or Wireshark for anomalous TCP flags/sequences.
HISTORY
No official history; likely custom/emerging from pentesters ~2010s. Similar to early packet crafters like Nemesis (2000s). Not in Linux kernel or GNU coreutils.


