Packet injection
Packet injection (also known as forging
protocols. Packet injection is commonly used in man-in-the-middle attacks and denial-of-service attacks
.
Capabilities
By utilizing
packet header
while the packet is being assembled.
General procedure
- Create a raw socket
- Create an Ethernet headerin memory
- Create an IP headerin memory
- Create a TCP header or UDP headerin memory
- Create the injected data in memory
- Assemble (concatenate) the headers and data together to form an injection packet
- Compute the correct IP and TCP or UDP packet checksums
- Send the packet to the raw socket
Uses
Packet injection has been used for:
- Disrupting certain services (file sharing or HTTP) by Internet service providers and wireless access points[1][2]
- Compromising wireless access pointsand circumventing their security
- Exploiting certain functionality in online games
- Determining the presence of internet censorship
- Allows for custom packet designers to test their custom packets by directly placing them onto a computer network
- Simulation of specific network traffic and scenarios
- Testing of network firewalls and intrusion detection systems
- Computer network auditing and troubleshooting computer network related issues
Detecting packet injection
Through the process of running a
Software
- lorcon, part of Airpwn
- KisMAC
- pcap
- Winsock
- CommView for WiFi Packet Generator
- Scapy
- Preinstalled software on Kali Linux (BackTrack was the predecessor)
- NetHunter (Kali Linux for Android)
- HexInject
See also
- Packet capture
- Packet generation model
- Raw socket
- Packet crafting
- Packet sniffer
External links
References
- S2CID 6631918.
- ^ a b "Packet Forgery by ISPs: A Report on the Comcast Affair". 28 November 2007.
- ^ "Detecting packet injection: A guide to observing packet spoofing by ISPs". 27 November 2007.
- ^ Weaver, Nicolas; Sommer, Robin; Paxson, Vern (September 2009). Detecting forged TCP reset packets (PDF). Proceedings of the Network and Distributed System Security Symposium, NDSS 2009, 8th February - 11th February 2009. San Diego, California, USA.