Bugtraq mailing list archives
Re: the next generation of nuke.c
From: mouse () Collatz McRCIM McGill EDU (der Mouse)
Date: Thu, 26 Jan 1995 10:12:23 -0500
More of a denial of service attack, but with the current discussion on bugtraq/firewalls regarding sequence number guessing, I thought I'd put forward a method on killing an established TCP connection, [...send FIN/ACK packets...]
Why not just fire off a few RST segments? If you see a segment fly by, it's really easy to synthesize an RST segment to blow away whichever end of the connection you please; all you have to do is make the sequence number correct. (This is easiest when you want to RST the end that sent the segment you eavesdropped on.) der Mouse mouse () collatz mcrcim mcgill edu
Current thread:
- Re: the next generation of nuke.c der Mouse (Jan 26)
- <Possible follow-ups>
- Re: the next generation of nuke.c Operator (Jan 26)
- Re: the next generation of nuke.c smb () research att com (Jan 26)
- Re: the next generation of nuke.c Dorian Deane (Jan 27)
- Re: the next generation of nuke.c Timothy Newsham (Jan 27)
- Re: the next generation of nuke.c smb () research att com (Jan 27)