Kali A
sudo iptables -A OUTPUT -p tcp --tcp-flags RST RST -j DROP
echo "1111" > index.html
python -m SimpleHTTPServer 8000
kali B
sudo iptables -A OUTPUT -p tcp --tcp-flags RST RST -j DROP
curl -i http://192.168.222.132:8000
Scapy中:
#三次握手+GET
from scapy.all import *
import random
target_ip = "192.168.222.132"
target_port = 8080
source_port = random.randint(1024, 65535)
ip = IP(dst=target_ip)
syn = ip / TCP(sport=source_port, dport=target_port, flags="S", seq=1000)
syn_ack = sr1(syn, timeout=2, verbose=0)
server_seq = syn_ack[TCP].seq
server_ack = syn_ack[TCP].ack
ack = ip / TCP(sport=source_port, dport=target_port, flags="A", seq=server_ack, ack=server_seq + 1)
send(ack, verbose=0)
http_get = "GET / HTTP/1.1\r\nHost: 192.168.222.132\r\nConnection: close\r\n\r\n"
http_payload = raw(http_get.encode("UTF-8"))
get_request = ip / TCP(sport=source_port, dport=target_port, flags="PA", seq=server_ack, ack=server_seq + 1) / http_payload
response = sr1(get_request, timeout=5, verbose=0)
然后直接诶wireshark查看就可以
浙公网安备 33010602011771号