Date: Mon, 28 Oct 2002 08:23:44 -0800 (PST) From: Julian Elischer <julian@elischer.org> To: sepehr sohrabi <sepehr_soh@hotmail.com> Cc: freebsd-net@freebsd.org Subject: Re: spoofing source code in kernel Message-ID: <Pine.BSF.4.21.0210280819220.13443-100000@InterJet.elischer.org> In-Reply-To: <F31rsOZoybKw2NIMcDE00006c3c@hotmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
I had two at one stage.. they used two methods. 1/ divert to a daemon that does it... natd has 80% or the logic needed already. 2/ a netgraph node hooked on top of the ethernet interface. Unfortunatly I don't have either any more.. Eventually I figured out that I could use ipfw 'fwd' by forwarding to a dumb proxy. this emant that the tcp session was in fact terminated by the tcp stack in my machine and that emulated tcp perfectly :-) On Mon, 28 Oct 2002, sepehr sohrabi wrote: > Hi list > Anyone has source code for spoofing (in kernel) for all input Tcp/IP pack= ets=20 > .For any TCP/IP packet recieve it creates an ACK for it . > someThing like spoofing GW > CLIENT <-----> GW <-------> server > connections are spoofed > THANX >=20 > _________________________________________________________________ > Broadband?=A0Dial-up? Get reliable MSN Internet Access.=20 > http://resourcecenter.msn.com/access/plans/default.asp >=20 >=20 > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-net" in the body of the message >=20 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-net" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0210280819220.13443-100000>