Dec 242020
 

Using the below code one can simulate TCP-SYN packets with random payload (may trigger data exfiltration detection). By RFC such packets are invalid and they might be dropped by your firewall or firewalls they traverse:

// more info https://scapy.readthedocs.io/en/latest/usage.html
import random
import string

import time

def get_random_string(length):
  letters = string.ascii_lowercase
  result_str = ''.join(random.choice(letters) for i in range(length))
  //print("Random string of length", length, "is:", result_str)

from scapy.all import *

while True:
  send(IP(dst="1.2.3.4") / TCP(sport=4444,dport=22,flags="S",seq=42) / (bytes(get_random_string(1200))))
  time.sleep(1)

 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

(required)

(required)