Hacking - The Art of Exploitation, 2nd Edition
Networking 247 if (pd->file_mem == NULL) pd->file_s = 0; arp_packetlen = LIBNET_ARP_H + LIBNET_ETH_H + pd->file_s; ifde ...
248 0x400 (eth->ether_type == ETHERTYPE_ARP? "ARP" : "RARP"), nemesis_lookup_linktype(l2->linktype)); } } } libnet_destroy ...
Networking 249 only builds ethernet/IP ARP packets, and consequently the first value should be ARPHRD_ETHER. The ARP packet type ...
250 0x400 arpspoof.c static struct libnet_link_int *llif; static struct ether_addr spoof_mac, target_mac; static in_addr_t spoof ...
Networking 251 The remaining libnet functions get hardware addresses, get the IP address, and look up hosts. These functions hav ...
252 0x400 0x451 SYN Flooding A SYN flood tries to exhaust states in the TCP/IP stack. Since TCP maintains “reliable” connections ...
Networking 253 dest_ip = libnet_name_resolve(argv[1], LIBNET_RESOLVE); // The host dest_port = (u_short) atoi(argv[2]); // The p ...
254 0x400 libnet_error(LIBNET_ERR_WARNING, "can't close network interface."); return 0; } This program uses a print_ip() functio ...
Networking 255 In the example above, the host 192.168.42.88 is a Windows XP machine running an openssh server on port 22 via cyg ...
256 0x400 The TCP connections don’t actually become active until the final ACK packet for the TCP handshake is checked. If the s ...
Networking 257 0x454 Ping Flooding Flooding DoS attacks don’t try to necessarily crash a service or resource, but instead try to ...
258 0x400 0x456 Distributed DoS Flooding.............................................................. A distributed DoS (DDoS) ...
Networking 259 The host machine will receive the spoofed packet with the correct acknowledgment number and will have no reason t ...
260 0x400 flags are found in the following order, from left to right: URG, ACK, PSH, RST, SYN, and FIN. This means that if the A ...
Networking 261 char errbuf[PCAP_ERRBUF_SIZE]; // Same size as LIBNET_ERRBUF_SIZE char *device; u_long target_ip; int network; st ...
262 0x400 / Sets a packet filter to look for established TCP connections to target_ip / int set_packet_filter(pcap_t pcap_hdl, s ...
Networking 263 TH_RST, // Control flags (RST flag set only) libnet_get_prand(LIBNET_PRu16), // Window size (randomized) 0, // Ur ...
264 0x400 0x470 Port Scanning Port scanning is a way of figuring out which ports are listening and accepting connections. Since ...
Networking 265 Christmas tree), and the Null scan sends a packet with no TCP flags set. While these types of scans are stealthie ...
266 0x400 At this point, the attacker contacts the idle host again to determine how much the IP ID has incremented. If it has on ...
«
9
10
11
12
13
14
15
16
17
18
»
Free download pdf