|
@@ -156,8 +156,6 @@ class SQLiAttack(BaseAttack.BaseAttack):
|
|
|
|
|
|
tcp_pkt.setfieldval("ack", 0)
|
|
|
|
|
|
-
|
|
|
-
|
|
|
|
|
|
if ip_pkt.getfieldval("dst") == orig_ip_dst:
|
|
|
|
|
@@ -172,13 +170,6 @@ class SQLiAttack(BaseAttack.BaseAttack):
|
|
|
|
|
|
tcp_pkt.setfieldval("ack", 0)
|
|
|
|
|
|
-
|
|
|
- elif tcp_pkt.getfieldval("dport") != 80 and tcp_pkt.getfieldval("sport") != 80:
|
|
|
-
|
|
|
- attacker_seq = random.randint(1000, 50000)
|
|
|
- victim_seq = random.randint(1000, 50000)
|
|
|
-
|
|
|
- tcp_pkt.setfieldval("ack", 0)
|
|
|
|
|
|
|
|
|
eth_frame.setfieldval("src", mac_source)
|