1 Purpose: To use intrusion fingerprints to track down compromised hosts.
2 Scope: TCP/UDP/ICMP (No fragmentation reassembly)
3 Specs: Program can create somewhat arbitrary UDP/ICMP/TCP packets/streams
4 and send them to a range of hosts. It also listens promiscuously
5 for predefined intrusion "fingerprints".