This commit is contained in:
2024-11-10 19:22:02 +09:00
parent ca0fd21d73
commit be44ad3718
2 changed files with 4 additions and 4 deletions

View File

@ -14,8 +14,8 @@ from random import randrange
log = logging.getLogger(__name__) log = logging.getLogger(__name__)
TCP_CLIENTS = {} # ((IP, port) -> [sent_packets]) TCP_CLIENTS = {} # ((IP, port) -> [sent_packets])
SERVER_IP = '131.159.15.68' # don't use the domain name in this case # SERVER_IP = '131.159.15.68' # don't use the domain name in this case
# SERVER_IP = '192.168.1.4' # don't use the domain name in this case SERVER_IP = '192.168.1.4' # don't use the domain name in this case
SERVER_PORT = 20102 SERVER_PORT = 20102
COOKIE_SECRET = 'TASTY_COOKIES123' COOKIE_SECRET = 'TASTY_COOKIES123'
INITIAL_SEQ = 1337 INITIAL_SEQ = 1337
@ -38,6 +38,7 @@ def handle_packet(packet: Packet):
print("received acknowledgement") print("received acknowledgement")
payload = bytes(packet[TCP].payload).decode(errors='ignore') payload = bytes(packet[TCP].payload).decode(errors='ignore')
print("Extracted flag:", payload) # This should print "hello world" print("Extracted flag:", payload) # This should print "hello world"
exit()
# Function to start the packet sniffing # Function to start the packet sniffing

View File

@ -73,7 +73,6 @@ def handle_packet(packet: Packet):
send(initial_syn) send(initial_syn)
else: else:
print("i am in this state")
if (0x02 in packet[TCP].flags) or (not seq == expected_cookie) or (not ack == INITIAL_SEQ): if (0x02 in packet[TCP].flags) or (not seq == expected_cookie) or (not ack == INITIAL_SEQ):
print(f'Invalid cookie {seq}, expected {expected_cookie}') print(f'Invalid cookie {seq}, expected {expected_cookie}')
rst = get_rst(src_ip, src_port, seq) rst = get_rst(src_ip, src_port, seq)