Skip to content

Instantly share code, notes, and snippets.

Keybase proof

I hereby claim:

  • I am JakeGinesin on github.
  • I am jake_g (https://keybase.io/jake_g) on keybase.
  • I have a public key whose fingerprint is 3AF2 53AF 100D 4724 EB77 603A 2AB0 3833 F8E6 971C

To claim this, I am signing this object:

Simple infrastructure for creating an analysis environment for lksctp.

Installation and Setup

First, you'll need the lksctp package for your OS, which you can find at https://github.com/sctp/lksctp-tools. For arch linux, I used https://archlinux.org/packages/community/x86_64/lksctp-tools/

We use the loopback network interface lo, though we could hypothetically dockerize this setup if need be.

On our localhost, we need to set a delay so the attacker can actually inject the packet in the right place. To do so, use: