Skip to content

fisherwky/how-does-a-tcp-reset-attack-work

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

How does a TCP Reset Attack work?

The supporting code for my blog post "How does a TCP Reset Attack work?"

To run

Pre-requisites: install ncat. Comes pre-installed on OSX.

  1. Install dependencies: virtualenv venv && source venv/bin/activate && pip install -r requirements.txt
  2. Setup TCP connection. In one terminal window run nc -nvl 8000 to set up a server
  3. In another terminal window run nc 127.0.0.1 8000 to connect to the server
  4. In a third window run python3 main.py to run our sniffing program
  5. Type into one of the TCP connection windows. You should see the sniffing program log some output, send a RST packet, and the nc connection should be broken

About

Companion code to my blog post "How does a TCP Reset Attack work?"

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%