Abstract

Operating Systems are vulnerable to malicious packet injection because of their inherent design and implementation flaws. TCP/IP stacks in different operating systems are especially vulnerable to this. Using crafted packets, we can analyze how each operating system responds to malicious packet injection. The main goal of this study is to analyze behavior of different operating systems to specially crafted packets. In this experiment, we crafted four types of packets: TCP SYN packets with data, packets with IP options, overlapping fragments, and tiny fragments. We use “Scapy” [1], a powerful packet crafting tool using Python to craft packets with customized headers and payloads. Results indicated that Windows and Linux behaved differently to these packets. Windows showed more vulnerability when receiving data in SYN packets, while Linux responded to packet with IP options. Both systems also handled overlapping fragments differently.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call