Answered step by step
Verified Expert Solution
Question
1 Approved Answer
TCP Session Hijacking TCP Session Hijacking Attack The objective of the TCP Session Hijacking attack is to hijack an existing TCP connection ( session )
TCP Session Hijacking
TCP Session Hijacking Attack
The objective of the TCP Session Hijacking attack is to hijack an existing TCP connection session
between two victims by injecting malicious contents into this session. If this connection is a telnet
session, attackers can inject malicious commands eg deleting an important file into this session,
causing the victims to execute the malicious commands. The TCP session Hijacking attack figure above
depicts how the attack works. In this task, you need to demonstrate how you can hijack a telnet session
between two computers. Your goal is to get the the telnet server to run a malicious command from you.
For the simplicity of the task, we assume that the attacker and the victim are on the same LAN.
Using Netwox. The corresponding Netwox tool for this task is numbered Here is part of the manual
for this tool. You can also type "netwox help" to get the full help information. You may also need
to use Wireshark to find out the correct parameters for building the spoofed TCP packet.
Listing : Part usage of netwox tool
You can use Wireshark to figure out what value you should put into each field of the spoofed TCP
packets. It should be noted in the TCP session hijacking section of the SEED book, the command listed
there does not set all the fields of the TCP and IP headers.
In the netwox command above, the tcpdata part only takes hex data. If we want to inject a command string,
which is typically represented as a humanreadable ASCII string, we need to convert it into a hex string.
There are many ways to do that, but we will just use a very simple command in Python. In the following, we
convert an ASCII string "Hello World" to a hex string the quotation marks are not included
Using Scapy. Please also use Scapy to conduct the TCP Session Hijacking attack. A skeleton code is
provided in the following you need to replace each @@@@ with an actual value:
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started