1
0

udpecho 303 B

12345678910111213141516
  1. .TH UDPECHO 8
  2. .SH NAME
  3. udpecho \- echo UDP packets
  4. .SH SYNOPSIS
  5. .PP
  6. .B ip/udpecho
  7. [
  8. .B -x
  9. .I ext
  10. ]
  11. .SH DESCRIPTION
  12. .PP
  13. Listen on UDP port 7 and echo back any packets
  14. received.
  15. This should only be run for testing since it can
  16. be used to disguise the identity of someone doing a denial of service attack.