Full Disclosure mailing list archives

Re: TCP/IP vulnerability


From: Scott Renna <srenna () lcssecuritygroup com>
Date: Tue, 22 May 2007 11:05:25 -0400

All you need is a tool that can craft packets to your desired specification. There are many choices out there. Google is your friend. So is Packetstorm and SecurityFocus.


On May 22, 2007, at 4:19 AM, Mohit Kohli wrote:

Hi Guys,



I got an assignment to write a white paper on TCP/IP and to show demo on how to exploits the same.



I have listed some of the vulnerability, but need some good tools (preferably windows based) to exploit the vulnerability and to perform further analysis.



overlapping IP fragments
Tear Drop
Land
SYN Attack
Ping Flooding
IP Spoofing
SYN Guessing

Smurf Attack

Source Routing
TCP Hijacking
Man-in-the-Middle Attack



I will appreciate; if you could provide me some inputs with regards to tools to exploits the vulnerability.



Cheers



Mohit







====================================================================== ======================================================

Disclaimer:

This message and the information contained herein is proprietary and confidential and subject to the Tech Mahindra policy statement, you may review at http://www.techmahindra.com/Disclaimer.html externally and http://tim.techmahindra.com/Disclaimer.html internally within Tech Mahindra.

====================================================================== ======================================================
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: