[3605] in bugtraq

home help back first fref pref prev next nref lref last post

Introducing in the left corner: Some spoofing code

daemon@ATHENA.MIT.EDU (Comfort is Treachery)
Fri Nov 15 12:45:50 1996

Date: 	Wed, 13 Nov 1996 12:54:20 +0100
Reply-To: Comfort is Treachery <wvdputte@reptile.rug.ac.be>
From: Comfort is Treachery <wvdputte@reptile.rug.ac.be>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@NETSPACE.ORG>

              -=[ A short overview of IP spoofing: PART I ]=-
                    -=[ Part of 'The Packet Project']=-

            (Includes Source for Linux 1.3.X and later kernels)
    All text and Source code written by Brecht Claerhout (Copyright 1996)
                 All source tested on Linux kernel 2.0.X
   All packet data captured with Sniffit 0.3.2 (a pre-release at that time)
-------------------------------------------------------------------------------

PART I: Simple spoofing (Non blind)
-----------------------------------

0. Introduction
0.1 What
0.2 For whom
0.3 Disclaimer
0.4 Licence

1. Short explanation of some words

2. Description of sourcecode
2.1 Source included
2.2 Programmer notes

3. TCP/IP (UDP) in an hazelnutshell

4. Non-blind spoofing
4.1 Know what you are doing
4.2 SYN flooding
4.3 Connection Killing
4.3.1 Using reset (RST)
4.3.2 Closing a connection (FIN)
4.3.3 Improving
4.4 Connection Hijacking
4.5 Other

5. The source code

see http://reptile.rug.ac.be/~coder/spoofit/spoofit.html



*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*
Wim Vandeputte                                --So pound the nails in tight--

home help back first fref pref prev next nref lref last post