Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TCP/IP lab issues #29

Open
mfthomps opened this issue Nov 12, 2019 · 3 comments
Open

TCP/IP lab issues #29

mfthomps opened this issue Nov 12, 2019 · 3 comments

Comments

@mfthomps
Copy link
Owner

The syn flood attack is not feasible in some environments. Consider revising lab manual to reflect this, and to simply highlight the observation of the backlog.
The "reverse shell" goal tests for a specific string. Either direct the student to cat such a file, or simply test for the server name in the shell prompt.

@enck
Copy link

enck commented Oct 8, 2021

I'm also having issues with the TCP RST attack. nping thinks it is setting the sequence number correctly, but when running wireshark from the main shell in the VM (not from a container), the sequence number of the sent RST packet is something very different. My guess is that this is a limitation of the container environment. Maybe additional POSIX capabilities need to be given to the containers?

@mfthomps
Copy link
Owner Author

In your main VM wireshark, did you set the protocol preference to uncheck relative sequence numbers? I see the same sequence numbers in both wiresharks when that is done.

@ayok007
Copy link

ayok007 commented Oct 31, 2023

i had the same issue of sequence number ( relative seq num), but when i used raw seq number it was working well.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants