TCP flags: Hackers Playground

TCP is a very important protocol on Internet. More than half of the traffic in Internet uses TCP. When it comes to services which require QoS (quality of service) TCP plays a major role whether it be logging into Facebook  or opening a website like Wikipedia.com the underlying protocol which takes care of “reliable” service is TCP. TCP’s dominance over internet has its advantages and disadvantages. The architecture of TCP/IP protocol suit doesn’t have any security features, what it has is algorithms for protocol timers, logics, buffering, mapping, management but there is nothing in code for its security. As Internet evolved the techniques to use it un-ethically also evolved. These techniques are nothing but exploitations of vulnerabilities in the protocol architectures. TCP being the major protocol used in internet, many hacking applications were developed which bypasses its ethical usage (we will study those tools in upcoming posts) so what are those vulnerabilities in TCP ? before we start let us have a brief look at a TCP packet structure.

tcp

Hello,

I have moved all my WordPress blogs to a single blog at Blogger, the complete article can be found at the below link

http://bvkmohan.blogspot.in/2011/02/tcp-flags-hackers-playground-and.html

I would be deleting all of my WordPress blogs soon, http://bvkmohan.blogspot.in/ is my only blog, you can find all my stuff there :)

Thank you for visiting and sorry for the inconvenience. See you there!

 

17 thoughts on “TCP flags: Hackers Playground

  1. Pingback: Rechnernetze-Klausur

  2. Thanks for this article! I’m currently learning for an exam about networks / protocols and your article explained basics in TCP much better than the presentaitons of my prof. did.

  3. Pingback: TCP IP header flags list | Cyber Security Notes

  4. Hi Mohan,
    Can i capture TCP packets filtered out from a Data sniffer like WIreshark and send out Crafted packets from a Packet crafter? I want to do ethical hacking one of my product. Wantto know if my product responds to any spoofed packets.
    Your help is appreciated.

    Thanks,
    Vishnu

  5. Pingback: TCP IP header flags list

attack

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s