Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

2
  • Blind TCP spoofing is again feasible due to SYN-Cookies. It is "easier" to guess the initial SEQ, you can skip the 1st SYN packet due to SYN-Cookies. This mean you only send the third packet in a handshake. This can also contain a payload. Details here jakoblell.com/blog/2013/08/13/… - Does not apply in all environments (stateful firewalls which do not understand syncookies will enforce the complete handshake) Commented Mar 31, 2014 at 10:43
  • 1
    interesting paper but unless I'm missing something to get a single spoofed connection he's sending out 300,000 packets per second for 8 minutes and that give 1 packet to ACK and do a blind request. Not the most practical for application level attacks like HTTP unless the attacker knows how to attack the system with a single request. all the same a good illustration of my last point which is "don't rely on it on its own" Commented Mar 31, 2014 at 12:41