You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Can the windows version of the code run directly? We see that the inject function seems to be annotated.
The mac version of the code can get rtt and other information at runtime, but finally reported a warning: you cannot differiate by diff 18446744073709551615
We have modified the version of the script and the ip address, but we didn't modified the max_window_size. Is this a serious problem?
The text was updated successfully, but these errors were encountered:
Thanks for your interest. Without more information (e.g., log), I can only give you some general suggestions. (1) Use physical machines rather than virtual ones; (2) At the beginning of the program, it tries to choose a threshold that’s used to distinguish between No ACKs and ACKs cases. If your program ceases at the beginning (You can check the output to see that), the environment is not satisfied. (c) Check if you can access those URLs in index.html normally (e.g., no redirection).
It may not trivial to reproduce the attack because the environment may vary a lot. I highly recommend you guys understand the whole process/code first, please don not hesitate to ask if you have any question.
We have some issues when running your code:
Can the windows version of the code run directly? We see that the inject function seems to be annotated.
Yes, it can run directly, probably with some minor modification as I mentioned in README.md.
The mac version of the code can get rtt and other information at runtime, but finally reported a warning: you cannot differiate by diff 18446744073709551615
I guess this is the most tricky part. The log basically means that the timing difference between without ACKs and with ACKs is not good enough. See the suggestions above.
We have modified the version of the script and the ip address, but we didn't modified the max_window_size. Is this a serious problem?
I don't think so. Because we only need to guess one seq number per window, as long as the max_window_size is smaller than the actual maximum window size on your computer (usually I get this value via Wireshark), it should be ok.
We have some issues when running your code:
We have modified the version of the script and the ip address, but we didn't modified the max_window_size. Is this a serious problem?
The text was updated successfully, but these errors were encountered: