Skip to content

mjsalerno/tcp-hijack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CSE408

TCP Hijacking

TODO/Progress:

  1. Learn how to receive packets from a single source. (not promiscuous mode)
  2. Create client identification.
  3. Create actual attack :)

Steps

  1. Identify server to tcp hijack
  2. Scan network for connecting clients
  3. When client is found, create fake packet and attempt to hijack the session

If we want to perform a tcp/ip 3-way handshake, we need to set up an IP tables rule to block the rst packet sent by the OS. See the ISSUES section below for the ip-table rule.

Setup

Issues

  1. Since our program runs in userspace, if we are attempting to connect and do a handshake with the server, when we receive the syn/ack, the kernel also receives it and sends a RST packet. TO prevent this we need to modify the ip-tables to ignore this packet.

iptables -A OUTPUT -p tcp --tcp-flags RST RST -j DROP

Resources

  1. TCP Hijacking

About

CSE408 TCP-Hijacking Project

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published