WinTCPKill
----------
This tool is TCP connection killer for Windows 9x/2K.
Firstly you must be able to sniff traffic of the target.
If you are in a switched network you can use ARP Cache
Poisoning tools like winarp_sk or winarp_mim (see
http://www.arp-sk.org)
Just several words from RFC 793 to explain the mecanism :
"In all states except SYN-SENT, all reset (RST) segments
are validated by checking their SEQ-fields. A reset is
valid if its sequence number is in the window. In the
SYN-SENT state (a RST received in response to an initial
SYN), the RST is acceptable if the ACK field acknowledges
the SYN."
Usage : wtk -h
Example : wtk -p 80 -i 192.168.0.1
N.B. : WinTCPKill requires WinPcap (see http://winpcap.polito.it)
>>> Valgasu <<<
Mail : valgasu@securiteinfo.com
Web : www.securiteinfo.com