Bugtraq mailing list archives

Introducing in the left corner: Some spoofing code


From: wvdputte () reptile rug ac be (Comfort is Treachery)
Date: Wed, 13 Nov 1996 12:54:20 +0100


              -=[ A short overview of IP spoofing: PART I ]=-
                    -=[ Part of 'The Packet Project']=-

            (Includes Source for Linux 1.3.X and later kernels)
    All text and Source code written by Brecht Claerhout (Copyright 1996)
                 All source tested on Linux kernel 2.0.X
   All packet data captured with Sniffit 0.3.2 (a pre-release at that time)
-------------------------------------------------------------------------------

PART I: Simple spoofing (Non blind)
-----------------------------------

0. Introduction
0.1 What
0.2 For whom
0.3 Disclaimer
0.4 Licence

1. Short explanation of some words

2. Description of sourcecode
2.1 Source included
2.2 Programmer notes

3. TCP/IP (UDP) in an hazelnutshell

4. Non-blind spoofing
4.1 Know what you are doing
4.2 SYN flooding
4.3 Connection Killing
4.3.1 Using reset (RST)
4.3.2 Closing a connection (FIN)
4.3.3 Improving
4.4 Connection Hijacking
4.5 Other

5. The source code

see http://reptile.rug.ac.be/~coder/spoofit/spoofit.html



*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*-=-*
Wim Vandeputte                                --So pound the nails in tight--



Current thread: