<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to Home</title><link>https://sourceforge.net/p/dns-forge/wiki/Home/</link><description>Recent changes to Home</description><atom:link href="https://sourceforge.net/p/dns-forge/wiki/Home/feed" rel="self"/><language>en</language><lastBuildDate>Mon, 18 Jul 2011 20:30:45 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/dns-forge/wiki/Home/feed" rel="self" type="application/rss+xml"/><item><title>WikiPage Home modified by Abhishek Shroff</title><link>https://sourceforge.net/p/dns-forge/wiki/Home/</link><description>&lt;pre&gt;--- v3 
+++ v4 
@@ -5,5 +5,3 @@
 On the DNS side, we first capture the incoming packet using libpcap. Then, we construct a new packet based off of the received packet that contains the reply. Once we have the reply data, we have to adjust ethernet, IP, UDP, and DNS headers in order to reverse it's direction back to the victim.
 
 The ARP side is initialized once the targets have been identified. On initialization, this part tries to get the hardware addresses of each of the victims. Once these have been identified, we spawn off a separate thread that sends ARP reply packets to each of the victims every 2 seconds.
-
-Please consider joining the project as a [Developer]
&lt;/pre&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Abhishek Shroff</dc:creator><pubDate>Mon, 18 Jul 2011 20:30:45 -0000</pubDate><guid>https://sourceforge.neta373c9f02a510c348ee2431f2ad447205cc0df94</guid></item></channel></rss>