Reputation: 11
While trying to perform a tcp TWH in scapy I encountered a problem. When my host receives the syn/ack, the kernel ip/tcp stack aborts the handshake by sending rst. It happens because the first packet sent (the syn) is transparent to the os due to the raw socket that scapy is using.
In some other questions regarding the same issue the solution was to set up iptables to drop packets with the rst flag.
Does anyone have a solution for windows? (I prefer not to use the FW unless there is no choice)
Thanks!
Upvotes: 1
Views: 1285
Reputation: 6237
That's a common problem, and it is not specific to Windows (or Scapy, for that matters - you can face similar issues with Masscan, for example).
You have totally understood and describe it: the problem lies in the IP address being "shared" between Scapy and your host's IP stack.
You have two options:
Hope this helps, happy hacking!
Upvotes: 1