           SPELL=hping
         VERSION=2.0.0-rc3
          SOURCE=${SPELL}${VERSION}.tar.gz
SOURCE_DIRECTORY=$BUILD_DIRECTORY/${SPELL}2-rc3
   SOURCE_URL[0]=http://www.hping.org/$SOURCE
     SOURCE_HASH=sha512:a5273ddf98d39f8bd602d7653bb7e024c1d0a48e6619d0e15eac9ce877d4869fd7e5500f86cc2a35b29b95a27012f2e8c6f69d9bb11e6f9bd30edafd459a1a9c
        WEB_SITE=http://www.hping.org/
         ENTERED=20030419
         LICENSE=GPL
        KEYWORDS="net"
           SHORT="A TCP/IP packet assembler/analyzer."
cat << EOF
A command-line oriented TCP/IP packet assembler/analyzer. The interface is
inspired to the ping(8) unix command, but hping isn't only able to send ICMP
echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a
traceroute mode, the ability to send files between a covered channel, and many
other features.  While hping was mainly used as a security tool in the past, it
can be used in many ways by people that don't care about security to test
networks and hosts. A subset of the stuff you can do using hping:

    * Firewall testing
    * Advanced port scanning
    * Network testing, using different protocols, TOS, fragmentation
    * Manual path MTU discovery
    * Advanced traceroute, under all the supported protocols
    * Remote OS fingerprinting
    * Remote uptime guessing
    * TCP/IP stacks auditing 
EOF
