Forging Packets
Hey there people :)
I've been studying lately spoofing and packet forging to understand more deeply the principles of Kevin Mitnick's Christmas Attack. From my google searches, i've learnt a lot about all that but i still have some doubts i'd like to discuss with you…
-
Spoofing attacks are extremely useful, and i really fell in love with man in the middle attack. I really wanna make pratical use in my network to learn a bit more of how i can employ such technique. I've been searching around for source codes and or codes to make my own spoofer since i'm not an ace programmer, but i couldn't find any. Does anybody know a spoofer, a source code, or knows how to make his/her own spoofer?
-
I've learnt what is the real aspect of TCP/IP packets and understand what aspects should be changed for them to be forged, but i still don't understand how can i capture and change them, or simply create one and send to another pc. Can anybody explain me? (believe me. Searched it all day in google, and it was not there)
PS: for 2) i understand how TCP/IP protocol works, so no need to explain it from the basic points… go straight to the point :)
Before you do that, I think you should learn how to code sockets first.
C
(Windows) http://www.vijaymukhi.com/vmis/vmchap4.htm This one analyzes the composition of a packet
(Linux/Unix) http://beej.us/guide/bgnet/output/html/singlepage/bgnet.html
PHP- you can search these from php.net or w3schools.com search function
Method 1: fsockopen, fwrite, fgets, feof
----
Method 2: socket_create, socket_write, socket_read
----
Method 3: cURL
I've found sample code in Perl: http://www.perlmonks.org/index.pl?node_id=17576&lastnode_id=63535
Python: http://www.blackhat-forums.com/index.php?showtopic=6634
Perhaps you could look through the source code for Ettercap: http://ettercap.sourceforge.net/download.php You could also search around http://www.blackhat-forums.com. They have some damn good example C code.
chess_rock wrote: Hey there people :)
I've been studying lately spoofing and packet forging to understand more deeply the principles of Kevin Mitnick's Christmas Attack. From my google searches, i've learnt a lot about all that but i still have some doubts i'd like to discuss with you…
Mitnick hey. Im not familiar with his Christmas Attack. Ill have to check that out.
- Spoofing attacks are extremely useful, and i really fell in love with man in the middle attack. I really wanna make pratical use in my network to learn a bit more of how i can employ such technique. I've been searching around for source codes and or codes to make my own spoofer since i'm not an ace programmer, but i couldn't find any. Does anybody know a spoofer, a source code, or knows how to make his/her own spoofer?
Im not sure what youve been trying for keywords. But i used "spoofing+tools" in a google search and got a page full of tools. Then i also tried "spoofing tool+source code" and got a good list again. I hope that helps.
- I've learnt what is the real aspect of TCP/IP packets and understand what aspects should be changed for them to be forged, but i still don't understand how can i capture and change them, or simply create one and send to another pc. Can anybody explain me? (believe me. Searched it all day in google, and it was not there)
PS: for 2) i understand how TCP/IP protocol works, so no need to explain it from the basic points… go straight to the point :)
Ive run out of time here but this turned up some good stuff.
capture packets+Forging packets
Sorry i cant help more.
Neqtan
Im not sure what youve been trying for keywords. But i used "spoofing+tools" in a google search and got a page full of tools. Then i also tried "spoofing tool+source code" and got a good list again. I hope that helps.
Yeah, i also used keywords, but then when i checked the tools were either for Linux, Mac, or for testing vulnerabilities. I need something for windows that attacks vulnerabilities, so that i can continue my studies and learn how can i protect my systems of spoof attacks, and how far can they go.
There was this spoofer named ARP spoofer, but it didn't work… it is not compatible with vista :(
sorry for the double post, but i'm afraid i haven't been clear enough…
Imagine… I sniff a network and capture all the information that its packets contained… how can i make use of the next packets, if the packets i sniffed have already passed?
if i can make use of those packets, how can i change their values?
chess_rock wrote: I like sniffing.. how to spoof in windows
First read this
http://msdn.microsoft.com/en-us/library/ms740548.aspx
Take note of the limitations brought on by SP2.
Then realize that despite the limitations in the standard network drivers provided with windows, Microsoft allows companies to develop their own drivers (including networking drivers). WinPcap was developed to address the limitations.
http://www.winpcap.org/docs/default.htm
the functionality you want is part of their NPF protocol driver.
To sniff traffic that doesn't belong to you, you need to poison the arp tables of the router.
edit:grammar
chess_rock wrote: i remember asking how could the packets that i sniffed (past), could be used on future modifications of TCP/IP packets transfered…. Packet injection. I believe there used to be a *nix tool called "Nemisis" that did just that; development stopped on it a while back, but the source should be invaluable for demonstration. Use the info Chin and Pwn gave you to work with Windows sockets. Oh, and if you run into the "Linux-only" problem… install Cygwin and try installing the prog in there.
Finally! So many stupid threads and responses, but I found one I can actually say something useful in for my 1337th post. Read it and weep. :)
You're very wecome. I'm glad I could help.I googled 'packet construction c' and found this http://www.ddj.com/cpp/184401729?pgno=3. It's in C++, but it is very thorough. @Zephy,