Re: [PEN-TEST] Replaying arbitrary packets

From: Frank Knobbe (FKnobbeat_private)
Date: Wed May 02 2001 - 07:01:52 PDT

  • Next message: Frank Knobbe: "Re: [PEN-TEST] wireless LAN traffic sniffing"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    > -----Original Message-----
    > From: Clarke, Paul [IT] [mailto:paul.clarkeat_private]
    > Sent: Tuesday, May 01, 2001 11:01 AM
    >
    > [...]
    > If there is a REAL 10.0.0.1 that's reachable by your victim on the
    > application port you're connecting to, then the SYN/ACK that
    > is sent to
    > 10.0.0.1 will get a RST response, which will tear down the
    > connection that
    > you're trying to establish. You'd have to use a spoofed
    > address that's not
    > reachable on this TCP port, or DOS 10.0.0.1 to make this work.
    
    Or simply poison the victims ARP cache with the MAC address of your
    station.
    
    Regards,
    Frank
    
    -----BEGIN PGP SIGNATURE-----
    Version: PGP Personal Privacy 6.5.8
    Comment: PGP or S/MIME encrypted email preferred.
    
    iQA/AwUBOvATUJytSsEygtEFEQIIyQCgsNQeTGC6AjQup8nAu/9drzlf6sEAoJEF
    yXiq/1TXDJu5yOL93sT+X4YZ
    =no//
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Thu May 03 2001 - 00:51:54 PDT