- Learn how to receive packets from a single source. (not promiscuous mode)
- Create client identification.
- Create actual attack :)
- Identify server to tcp hijack
- Scan network for connecting clients
- When client is found, create fake packet and attempt to hijack the session
If we want to perform a tcp/ip 3-way handshake, we need to set up an IP tables rule to block the rst packet sent by the OS. See the ISSUES section below for the ip-table rule.
- Since our program runs in userspace, if we are attempting to connect and do a handshake with the server, when we receive the syn/ack, the kernel also receives it and sends a RST packet. TO prevent this we need to modify the ip-tables to ignore this packet.
iptables -A OUTPUT -p tcp --tcp-flags RST RST -j DROP