the RST packet attack is basically when a client initiates a connection (3 way handshake) and an attacker spoofs the identity of the server and get the correct sequence number and ACK no and sends a packet with the RST packet set to one..

but what i am trying to do is,,, reset the connection from the client its self instead of the server resetting the connection,,, so that another spoofed server can interact with the client (Victim)

so basically a client would send a request such as
pkt-1: seq #: 12345
         ack #: 54321
        flags#: PA<-PSH-ACK
       Payload: GET

how would the immediate RST Packet look like??

pkt-2: seq#: 12345+42<-(42 being the payload lenght of previous packet)
         ack#: 54321
       flags#: R<-RST
is this Right??? or does the RST packet need to have the exact same seq # as pkt-1??