[3605] in bugtraq
Introducing in the left corner: Some spoofing code
daemon@ATHENA.MIT.EDU (Comfort is Treachery)
Fri Nov 15 12:45:50 1996
Date: Wed, 13 Nov 1996 12:54:20 +0100
Reply-To: Comfort is Treachery <wvdputte@reptile.rug.ac.be>
From: Comfort is Treachery <wvdputte@reptile.rug.ac.be>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@NETSPACE.ORG>
-=[ A short overview of IP spoofing: PART I ]=-
-=[ Part of 'The Packet Project']=-
(Includes Source for Linux 1.3.X and later kernels)
All text and Source code written by Brecht Claerhout (Copyright 1996)
All source tested on Linux kernel 2.0.X
All packet data captured with Sniffit 0.3.2 (a pre-release at that time)
-------------------------------------------------------------------------------
PART I: Simple spoofing (Non blind)
-----------------------------------
0. Introduction
0.1 What
0.2 For whom
0.3 Disclaimer
0.4 Licence
1. Short explanation of some words
2. Description of sourcecode
2.1 Source included
2.2 Programmer notes
3. TCP/IP (UDP) in an hazelnutshell
4. Non-blind spoofing
4.1 Know what you are doing
4.2 SYN flooding
4.3 Connection Killing
4.3.1 Using reset (RST)
4.3.2 Closing a connection (FIN)
4.3.3 Improving
4.4 Connection Hijacking
4.5 Other
5. The source code
see http://reptile.rug.ac.be/~coder/spoofit/spoofit.html
*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*
Wim Vandeputte --So pound the nails in tight--