Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Why only SYN and ACK+PSH packets? #1

Open
happyeverydaylove opened this issue Aug 5, 2024 · 39 comments
Open

Why only SYN and ACK+PSH packets? #1

happyeverydaylove opened this issue Aug 5, 2024 · 39 comments

Comments

@happyeverydaylove
Copy link

Hello, I would like to ask, I am testing with two direct computers (static IPs on the same subnet). I modified the dst_ip in mra.py to the IP of nginx installed on Kali, and sent it according to the commands on Redmin. Eventually, there was an 11.pcap file. When I opened it with Wireshark, I found only SYN and ACK+PSH from src to dst, nothing else. So how do I know if it reflected?

@moloch54
Copy link
Owner

moloch54 commented Aug 5, 2024 via email

@moloch54
Copy link
Owner

moloch54 commented Aug 5, 2024 via email

@happyeverydaylove
Copy link
Author

I'd like to conduct some tests on the internal network to see how they are performed. Could you recommend any middleware or environments for me?

@happyeverydaylove
Copy link
Author

After running the script, a file named 11.pcap will be generated in the folder. When opened with Wireshark, it contains only SYN and ACK+PSH packets from the target to the server. Where can I find the returned RST packets? If I try capturing packets directly with Wireshark, there's nothing there.

@moloch54
Copy link
Owner

moloch54 commented Aug 7, 2024 via email

@happyeverydaylove
Copy link
Author

I wonder if the TCP reflection amplification can only be tested on the public network, or is it possible to test it on a private network that I have set up myself?

@happyeverydaylove
Copy link
Author

Is it possible to set up your own server, like with Apache, Nginx, or Tomcat?

@moloch54
Copy link
Owner

moloch54 commented Aug 8, 2024 via email

@happyeverydaylove
Copy link
Author

Accessing a webpage on the public internet (the "forbidden web" in your code) using a public IP address is generally not an issue; however, the server prohibits access to the target server. This becomes problematic within an internal network setting.

@moloch54
Copy link
Owner

moloch54 commented Aug 8, 2024 via email

@happyeverydaylove
Copy link
Author

I understand how it works, but I'm a bit confused. When online, the script you wrote can send packets to the server, which eventually reach the target IP. However, when offline with a static IP set, the target server cannot receive them. No data is received when sniffing packets on a server built on my own computer. It feels like the sent requests are not getting to the network card of this computer.

@moloch54
Copy link
Owner

moloch54 commented Aug 9, 2024 via email

@moloch54
Copy link
Owner

moloch54 commented Aug 9, 2024 via email

@happyeverydaylove
Copy link
Author

happyeverydaylove commented Aug 9, 2024

I re-ran the script you compiled, conducting tests on one computer with three virtual machines (NAT). Machine 147 is the pivot (server), and machine 149 is the target, as shown in Figure 1. I would like to ask why the pivot sends a SYN-ACK to the target, and then the target responds with an RST to the pivot?

image

@moloch54
Copy link
Owner

moloch54 commented Aug 9, 2024 via email

@happyeverydaylove
Copy link
Author

In NAT mode:
Attacker machine IP: 192.168.100.1
Server IP: 192.168.100.10
Target machine IP: 192.168.100.110
In the code, fill in "forbidden" as 192.168.100.10, and run it as python mra.py 100 192.168.100.110

@moloch54
Copy link
Owner

moloch54 commented Aug 9, 2024 via email

@happyeverydaylove
Copy link
Author

happyeverydaylove commented Aug 9, 2024

  • the server to DDOS (target machine):192.168.100.10
  • the forbidden site:192.168.100.110
  • the middlebox: tomcat7 192.168.100.110:8080

@moloch54
Copy link
Owner

moloch54 commented Aug 9, 2024 via email

@happyeverydaylove
Copy link
Author

Isn't the middlebox IP the same as the server's IP?

@moloch54
Copy link
Owner

moloch54 commented Aug 9, 2024 via email

@happyeverydaylove
Copy link
Author

I'm starting to get what you mean; so currently, only a simple server has been set up without the intermediary box? Are there any tutorials available for me to simulate the intermediary box?

@happyeverydaylove
Copy link
Author

So, for example, if I turn on the firewall in a Windows 10 system, would that be considered an intermediary box?

@moloch54
Copy link
Owner

moloch54 commented Aug 9, 2024 via email

@happyeverydaylove
Copy link
Author

Actually, you could simulate the environment with two devices: one as an attacking machine (running Kali Linux) with a firewall configured to block the destination address, and the other as the target machine or victim. Would this setup work?

@moloch54
Copy link
Owner

moloch54 commented Aug 9, 2024 via email

@happyeverydaylove
Copy link
Author

I'm going to try setting up the firewall and creating rules, but I have a question. Perhaps I didn't explain it clearly enough. If we set a blocked website, such as Facebook, in a connected environment, we can perform a DDoS attack because we're accessing their servers. But in a disconnected environment, can we set any website as blocked, or...? I hope you understand what I mean. I'm a bit confused about setting up the block.

@moloch54
Copy link
Owner

moloch54 commented Aug 9, 2024 via email

@happyeverydaylove
Copy link
Author

Is enabling a Linux firewall and adding rules considered simulating a middlebox? How exactly can I simulate a middlebox?

@moloch54
Copy link
Owner

moloch54 commented Aug 9, 2024 via email

@happyeverydaylove
Copy link
Author

If I use Kali Linux with Apache to host a website and set access restrictions so that the source IP is blocked, and then set the forbidden website to be Kali's own IP address, would a script-based attack theoretically perform a DDoS on the source IP?

@moloch54
Copy link
Owner

moloch54 commented Aug 9, 2024 via email

@happyeverydaylove
Copy link
Author

OK,What is the final result of DDoS attack on the target drone using the intermediate box? CPU increase? System crash?

@moloch54
Copy link
Owner

moloch54 commented Aug 9, 2024 via email

@happyeverydaylove
Copy link
Author

Why, when connected to the internet, sending a forbidden website to the middlebox can trigger interception? It seems like no specific settings are made on the middlebox itself, and I'm not quite understanding the principle behind this.

@moloch54
Copy link
Owner

moloch54 commented Aug 10, 2024 via email

@happyeverydaylove
Copy link
Author

The result obtained by using this script is based on the middleware reflection shown in (b) of the image

@happyeverydaylove
Copy link
Author

I see that it is necessary to configure the wrong middleware server, then if the set to access the source ip forbidden, then the script to disable the server ip, so can it?

@happyeverydaylove
Copy link
Author

Have you tested it on the intranet? If so, how was your intermediary box configured?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants