Check Point: Packet Injection with Pinj
Today, I will present you a small and handy utility: Check Point Packet Injector, also called Pinj.
Pinj allows you to generate a TCP (default), UDP or ICMP packet with the parameters of your choice. This allows you to test the filtering policy against this packet.
[[email protected]:0]# ./pinj –sport 4242 –dport 7777 -I eth1 10.10.10.10 20.20.20.20
SEND: 10.10.10.10:4242 => 20.20.20.20:7777, TCP (S)
RECV: 20.20.20.20:7777 => 10.10.10.10:4242, TCP (RA)
In this example, we send a TCP SYN packet, via eth1, with a source port 4242 and a destination port 7777, a source IP 10.10.10.10 and a destination IP 20.20.20.20
Full details in SK 110865: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk110865