Questions tagged [tcp]
Transmission Control Protocol (TCP) is a transport layer protocol that provides a connection-oriented data stream service with guaranteed, in-order delivery.
328 questions
0 votes
0 answers
82 views
Stateful firewalls and the 'RELATED' state
For years, I've used the following to accept 'RELATED' packets: ... /usr/sbin/iptables -P INPUT DROP ... /usr/sbin/iptables -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT ... Use the ...
1 vote
0 answers
25 views
What options are there for live output of nmap scan results? [duplicate]
I need to do a lot of potentially really slow 65k port sweeps and UDP scans. The problem I have is that the XML output (open ports, service probe results) appears only when the entire scan is complete....
0 votes
1 answer
142 views
How is packet injection performed for typical TCP game sessions?
I'm curious how packet injection could be done for games that establish a TCP session through a specific port (such as 443). More specifically, I'm wondering what can be done to inject packets into ...
2 votes
1 answer
96 views
What's the point of including time t in the hashed part of tcp SYN cookie?
My understanding TCP SYN Cookie mitigates SYN Flood attack by allowing all information to be stored in the cookie itself and not storing anything on the server. TCP SYN Cookie is implemented as the ...
1 vote
0 answers
117 views
Is disabling TCP state check a significant security loss in a firewall?
We have a higly dynamic and asymetrical network topology for a specific projet using FortiGate firewalls. Because of asymetry, some communications are sometimes dropped because firewalls only see one ...
1 vote
1 answer
153 views
how to reset only TCP connections to my web server which are just TCP packets, but no further HTTP packets
How to reset only TCP connections to my web server which are just TCP packets, but no further HTTP packets. Let's say I have a web server and users connect via browser (so, flow would be TCP handshake ...
0 votes
1 answer
264 views
Is TCP still more secure than UDP if all data is encrypted?
TCP is preferred over UDP for various reasons, security being one of them. Obviously, TCP is also preferred for various reason unrelated to security (e.g. error debugging). So in the context of ...
2 votes
0 answers
118 views
TCP Packet Injection Mitigations
I'm trying to understand whether TCP packet injection into a plaintext protocol is possible within a switched network (or wherever there are no validations relating to IP legitimacy). If I know there ...
0 votes
1 answer
145 views
Why does my Xbox One controller query out to Akamai Technologies when I plug it in? [closed]
Running wireshark, I've been having issues with my xbox controller I plug into my pc. When I plug it in, it immediately starts some communication with 23.32.109.224. So I firewalled that address out, ...
13 votes
4 answers
9k views
What security risks are involved in using older HTTP protocols such as HTTP/1.x that would justify upgrading to HTTP/2 or HTTP/3?
As of 2023, still many webservers support HTTP/1.0 and HTTP/1.1 while not supporting recent HTTP/2 and/or HTTP/3 protocols. I understand that newer HTTP versions offer various performance enhancements,...
0 votes
4 answers
1k views
Is HTTP/0.9 considered "End-of-Life" (EOL) due to security vulnerabilities or risks?
I'm exploring the history and evolution of the HTTP protocol and I know that HTTP/0.9 is generally not used anymore. It's clear how features evolved in newer HTTP versions and how primitive HTTP/0.9 ...
0 votes
1 answer
392 views
Is HTTP/1.0 inherently more susceptible to denial-of-service (DoS) attacks?
I'm looking into HTTP version specific risks. HTTP 1.0 lacks support for persistent connections, meaning each request/response pair requires a new TCP connection to be established. Considering the ...
0 votes
1 answer
239 views
TCP connection scrambling to evade tracking
There was a project on GitHub that (was going to, if it hadn't been abandoned) modify TCP fields in order to evade packet sniffing. It explains in specifics how this would work here. In particular, ...
-1 votes
1 answer
138 views
TCP packets containing machine code
Is it possible that an attacker puts machine code on a TCP packet? In a way that before passing to the CPU and getting an error that such a function doesn't exist on the application, it first needs to ...
0 votes
2 answers
294 views
Modify the protocol of a packet
Is it possible that for example there is a TCP packet, and using a proxy, you intercept it and using a tool you change the protocol entirely? Like for example from TCP to UDP or any other custom ...