fix: randomize VIO seq/ack and correct SOCKS5 display for panel users

Randomize TCP seq/ack numbers in VIO packets on both client and server
to reduce packet fingerprinting. Fix misleading SOCKS5 port display
when panel is detected but SOCKS5 auto-add didn't complete — previously
showed the panel port (e.g. 443) labeled as SOCKS5.

Ref #27, Fixes #35
This commit is contained in:
SamNet-dev
2026-02-07 10:26:24 -06:00
parent 18147a7fdd
commit de8442c712
3 changed files with 24 additions and 6 deletions

View File

@@ -1,5 +1,6 @@
from scapy.all import AsyncSniffer,IP,TCP,Raw,conf,Ether,get_if_hwaddr
import asyncio
import random
import parameters
import logging
import os
@@ -84,6 +85,8 @@ else:
def send_to_violated_TCP(binary_data):
new_pkt = basepkt.copy()
new_pkt[TCP].seq = random.randint(1024,1048576)
new_pkt[TCP].ack = random.randint(1024,1048576)
new_pkt[TCP].load = binary_data
skt.send(new_pkt)