Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
As dsniff needs a lot of dependencies, it may be easier to use hping3.
Using hping3 you should be able to nuke your offender (or better yourself if he is firewalled or if you don't want him to see you nuking) by sending an icmp error packet. This should cut the connection. You will need (his ip adress,his remote TCP port,your ip adress, your destination TCP port:80)
It may be done easily with an iptables script since it is faster and machines may (maliciously) ignore packets. Use REJECT instead of DROP so both machines see either TCP RST's (reset) or ICMP UNREACH as soon as they try to engage in communication so they'll drop states in the network stack.
It may be done easily with an iptables script since it is faster
Yes this is the cleanest,I gave others just for fun
Quote:
Originally Posted by primo
machines may (maliciously) ignore packets.
Its why I said : send the icmp to your own host. If you don't maliciously ignore these packets, the connection will effectively be torn, at least from your part.
Its why I said : send the icmp to your own host. If you don't maliciously ignore these packets, the connection will effectively be torn, at least from your part.
Well, it is an option if you don't want to use your own available bandwidth answering every malicious request, but sending the attacker these reset packets (when it doesn't matter that he sees them) has the benefit of preventing his network stack from retrying old TCP connections. Maybe the best option would be temporarily using REJECT for 1 or 2 minutes, then using DROP.
It looks like dsniff has been ported to newer libraries and had some other updates from Debian. Apparently they passed those back upstream, but it's unclear to me what, if anything is being done with them there.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.