On Mon, Oct 28, 2002 at 03:34:58PM +0330, sepehr sohrabi wrote:
> Hi list
> Anyone has source code for spoofing (in kernel) for all input Tcp/IP
> packets .For any TCP/IP packet recieve it creates an ACK for it .
> someThing like spoofing GW
> CLIENT <-> GW <---> server
>connection
From: sepehr sohrabi [mailto:sepehr_soh@;hotmail.com]
>
> Hi list
> Anyone has source code for spoofing (in kernel) for all input
> Tcp/IP packets
> .For any TCP/IP packet recieve it creates an ACK for it .
> someThing like spoofing GW
> CLIENT <-> GW <---> server
> connections a
ipfw allows you to catch the connections, but it doesn't enable your
application to spoof the proxied connection as if it was coming straight from
the client.
Baldur
On Monday 28 October 2002 15:01, you wrote:
> From: sepehr sohrabi [mailto:sepehr_soh@;hotmail.com]
>
> > Hi list
> > Anyone has
I had two at one stage..
they used two methods.
1/ divert to a daemon that does it... natd has 80% or the logic needed
already.
2/ a netgraph node hooked on top of the ethernet interface.
Unfortunatly I don't have either any more..
Eventually I figured out that I could use ipfw 'fwd'
by forward
sepehr sohrabi wrote:
> Hi list
> Anyone has source code for spoofing (in kernel) for all input Tcp/IP packets
> .For any TCP/IP packet recieve it creates an ACK for it .
> someThing like spoofing GW
> CLIENT <-> GW <---> server
> connections are spoofed
Since the SYN bit has to be