add photo
This commit is contained in:
parent
7ee5db4120
commit
64e05eed86
@ -199,6 +199,12 @@ To wrap up, I will create three MiTM style attacks that can be executed by the p
|
|||||||
|
|
||||||
This is a simple script found in [ttl.py](./scripts/ttl.py). The idea here is to modify all TTL (time-to-live) values in ipv4 and ipv6 packets passing through the pitap and set them to 65, if they are not already 65. This logic could be extended to include any known packet type which contains a TTL field. We also keep a tally of the number of packets modified
|
This is a simple script found in [ttl.py](./scripts/ttl.py). The idea here is to modify all TTL (time-to-live) values in ipv4 and ipv6 packets passing through the pitap and set them to 65, if they are not already 65. This logic could be extended to include any known packet type which contains a TTL field. We also keep a tally of the number of packets modified
|
||||||
|
|
||||||
|
Ultimetly, this script does the job. Here It runs for 2.5 seconds (in the span of this capture that is from 11.12 to 13.42). In this time, it sees 28 ip or ipv6 packets, only one of which already has a TTL of 65. For the rest, the TTL is modified to 65.
|
||||||
|
|
||||||
|
The result is that for a brief period of the wireshark capture while I have the RTSP stream running, 28 packets come up in a filter in traffic to the reolink device with a ttl of 65.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
#### 6b.
|
#### 6b.
|
||||||
|
|
||||||
#### 6c.
|
#### 6c.
|
BIN
final/photos/attack/ttl.png
Normal file
BIN
final/photos/attack/ttl.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 1.1 MiB |
Reference in New Issue
Block a user