RST packet attack from Client
the RST packet attack is basically when a client initiates a connection (3 way handshake) and an attacker spoofs the identity of the server and get the correct sequence number and ACK no and sends a packet with the RST packet set to one..
but what i am trying to do is,,, reset the connection from the client its self instead of the server resetting the connection,,, so that another spoofed server can interact with the client (Victim)
so basically a client would send a request such as
is this Right??? or does the RST packet need to have the exact same seq # as pkt-1??
pkt-1: seq #: 12345
ack #: 54321
Payload: GET http://www.someserver.com/somefile.ext
how would the immediate RST Packet look like??
pkt-2: seq#: 12345+42<-(42 being the payload lenght of previous packet)