Skip to content

Latest commit

 

History

History
64 lines (40 loc) · 2.58 KB

File metadata and controls

64 lines (40 loc) · 2.58 KB

🔍 TCP-IP Protocol Analysis Implementation

📌 Overview

The vulnerabilities in the TCP/IP protocols represent a unique class of protocol design and implementation flaws. These weaknesses emphasize the importance of integrating security from the beginning rather than treating it as an afterthought.

Studying these vulnerabilities helps in understanding:

  • The challenges of network security
  • The necessity of various security measures

This lab provides hands-on experience with several TCP-based attacks to illustrate real-world network security risks.


🏆 Lab Objectives

In this lab, students will conduct multiple attacks on TCP, covering the following topics:

✔️ The TCP Protocol – Understanding its structure and functionality
✔️ TCP SYN Flood Attack – Exploring denial-of-service (DoS) techniques and SYN cookies as a defense mechanism
✔️ TCP Reset Attack – Disrupting established connections by injecting forged TCP reset packets
✔️ TCP Session Hijacking Attack – Exploiting sequence number prediction to take over an active session
✔️ Reverse Shell – Gaining remote control over a target system using TCP-based exploits

🔹 Bonus: A special type of TCP attack, the Mitnick attack, is covered in a separate lab.


🚀 By completing this lab, students will gain critical insights into TCP/IP security flaws and the importance of implementing robust security measures in network protocols.

image image

🛠️ Languages and Utilities Used

  • Python
  • Ubuntu 20.04 VM

💻 Environments Used

  • Windows 10 (21H2)

🔍 Program Walk-through

🚀 Task 1: SYN Flooding Attack

🔹 Task 1.1: Launching the attack using Python
🔹 Task 1.2: Launching the attack using C
🔹 Task 1.3: Enabling the SYN Cookie countermeasure

🚀 Task 2: TCP RST Attacks on Telnet Connections

🔹 Manual Attack Execution
🔹 (Optional): Automating the attack

🚀 Task 3: TCP Session Hijacking

🔹 Manual Attack Execution
🔹 (Optional): Automating the attack

🚀 Task 4: Creating a Reverse Shell Using TCP Session Hijacking


This lab provides hands-on experience in executing and mitigating critical TCP-based attacks, strengthening your understanding of network security vulnerabilities.