[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] TCP/IP vulnerability
- To: "Mohit Kohli" <mkohli@xxxxxxxxxxxxxxxx>
- Subject: Re: [Full-disclosure] TCP/IP vulnerability
- From: Scott Renna <srenna@xxxxxxxxxxxxxxxxxxxx>
- Date: Tue, 22 May 2007 11:05:25 -0400
All you need is a tool that can craft packets to your desired
specification. There are many choices out there. Google is your
friend. So is Packetstorm and SecurityFocus.
On May 22, 2007, at 4:19 AM, Mohit Kohli wrote:
Hi Guys,
I got an assignment to write a white paper on TCP/IP and to show
demo on how to exploits the same.
I have listed some of the vulnerability, but need some good tools
(preferably windows based) to exploit the vulnerability and to
perform further analysis.
overlapping IP fragments
Tear Drop
Land
SYN Attack
Ping Flooding
IP Spoofing
SYN Guessing
Smurf Attack
Source Routing
TCP Hijacking
Man-in-the-Middle Attack
I will appreciate; if you could provide me some inputs with regards
to tools to exploits the vulnerability.
Cheers
Mohit
======================================================================
======================================================
Disclaimer:
This message and the information contained herein is proprietary
and confidential and subject to the Tech Mahindra policy statement,
you may review at http://www.techmahindra.com/Disclaimer.html
externally and http://tim.techmahindra.com/Disclaimer.html
internally within Tech Mahindra.
======================================================================
======================================================
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/