what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

whatuneed.txt

whatuneed.txt
Posted Feb 24, 2000
Authored by Neonlenz | Site mha1.8m.com

Describes what you need to Spoof/Hijack/Predict sequence numbers. Meant for newbies who don't know what to use to execute those kind of attacks often seen in TCP/IP Security Documents.

tags | paper, spoof, tcp, protocol
SHA-256 | 3ea630fc7ed9d3ed3d8630424dd21cb5fd189500f57a386684b160d1a0c87a1c

whatuneed.txt

Change Mirror Download
 
----------------------
| What you need to : |
| Spoof/Hijack/Predict |
| by: |
| Neon-Lenz® |
----------------------


Well this is my second text-file, i hope you've enjoyed
my last text-file. This one is aimed at beginners who are
interested into spoofing, hijacking and sequence number
attacks. Most of the beginners who have read those text-files
don't know what kind of programs/tools/scripts they need to
do those specified attacks written in those text-files. But
it is very true, i've read most of the TCP/IP-security
documents out there, and none of them tells you what you
need, to execute the specified attacks. (Well at least not
in an easy way, like where to obtain those specified tools).
So that's one of the main reasons why i attempted to write
this text-file.

It is actually pretty simple, to execute all of the attacks
mentioned in those text-files you'll simply need 4 things :

*NOTE* : All the tools i've mentioned are provided with urls
at the end of this text, i guess that's easier for
you to obtain the tools i've mentioned.

1. Some sorta Unix or Unix-based OS (Operating System).
Linux for example would work fine if you plan to do
some serious TCP/IP Internetworking-related stuff.
Because you really can't do some good attacks with
any MS-based products, but hey IT IS possible, but still,
what i'm referring in this text-file are attacks executed
in Linux.

2. Packet Generator (like Spak, Libnet, etc.)
(Generates and sends packets which you specify,
this includes flags, sequence numbers, window size
and everything else you usually see in a packet.)

3. Packet Sniffer (like Sniffit, Ipgrab, etc.)
*NOTE* : You'll need a sniffer which allows you to read
the header of a specific packet (which includes
flags, sequence numbers, window size, source and
destination ports etc.)

4. Usually a trusted host,a target host and attacking host
(that's you, most of the hackers/crackers out there uses
compromised hosts.)

*NOTE*: #4 was actually meant for the real newbies :-)


That's about everything you will need to do those attacks.
Now lets go on about WHERE to obtain those tools mentioned above:

Linux:
-----
http://www.linux.org would be a great site if you're looking
for some good Linux distro's, check it out.

Packet Generators:
-----------------

Spak - http://freeport.xenos.net/~xenon/software/spak/index.html

Libnet - http://www.packetfactory.net/libnet/

Packet Sniffers:
---------------

Sniffit - http://reptile.rug.ac.be/~coder/sniffit/sniffit.html

Ipgrab - http://www.xnet.com/~cathmike/MSB/Software/


Trusted hosts and Targeted hosts:
--------------------------------

Ummmmmmmmmmm...... >;-)


Other Recommended Text-Files Concerning TCP/IP security:
-------------------------------------------------------

-How Mitnick hacked Shimomura/Sequence Number Attacks by Rik Farrow

-A Simple Active Attack against TCP by Laurent Joncheray

-IP Spoofing Demystified by daemon9/route/infinity

-Introduction to the Internet Protocols by Charles L. Hedrick
*Not neccesarily about security, but it is one of those must-reads*


Spreaded by Neon-Lenz® and The Millennium Hackers Association.
Copyrighted and All Rights Reserved®
E-Mail:neonlenz@hackermail.net
-2000- http://www.mha1.8m.com
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    13 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    27 Files
  • 30
    Jul 30th
    49 Files
  • 31
    Jul 31st
    29 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close