The supporting code for my blog post "How does a TCP Reset Attack work?"
Pre-requisites: install ncat. Comes pre-installed on OSX.
- Install dependencies:
virtualenv venv && source venv/bin/activate && pip install -r requirements.txt
- Setup TCP connection. In one terminal window run
nc -nvl 8000
to set up a server - In another terminal window run
nc 127.0.0.1 8000
to connect to the server - In a third window run
python3 main.py
to run our sniffing program - Type into one of the TCP connection windows. You should see the sniffing program log some output, send a
RST
packet, and thenc
connection should be broken