Home page logo
/

pen-test logo Penetration Testing mailing list archives

Re: TCP Header manipulation of the protocol field
From: <jvfields () tds net>
Date: Fri, 30 Jan 2004 20:36:12 +0000

hping if you can use a linux box.  I've seen several for Win32 but they all require you to choose from a list of 
specific IP protocols (engage packet builder, nemesis).


From: "Michael Burns" <mburns () sp-uk com>
Date: 2004/01/30 Fri PM 04:08:32 GMT
To: <pen-test () securityfocus com>
Subject: TCP Header manipulation of the protocol field

Hi Guys,

Sorry for this kind of request (well not really, not if I get the
answer). I need to manipulate the protocol field of a TCP session to
test for IP protocol filtering across a non-managed link. This is
predominantly to help test/prove filtering in place when running ESP.

I simply need to get a pointer to somewhere to look up as I've hit a
brick wall at the minute.

Predominantly the test environment will be from Windows platforms but
can also be from Linux.

Cheers,

Mike



**********************************************************************
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they
are addressed. If you have received this email in error please notify
the system manager.

This footnote also confirms that this email message has been swept by
MIMEsweeper for the presence of computer viruses.

www.mimesweeper.com
**********************************************************************


---------------------------------------------------------------------------
----------------------------------------------------------------------------




---------------------------------------------------------------------------
----------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]