Detection of an on-path connection reset censorship technology is obtained by pinging the provided destination host IP with the suspected censored data.
In the analysis phase, we can infer information about the relative location of the on-path packet injection, by number of hops from the originating host.
Evasion is obtained bypassing in the hop count at which we suspect the censorship device to be located on path, as found in the analysis step
+ Python 2.7.x and python Scapy
git clone https://github.com/williampsmith/Hitman && cd Hitman
sudo python ping.py
sudo python traceroute.py
sudo python evade.py 25