i wrote a script to hijack a TCP connection, using python's scapy.
when testing the attack on a connection between a couple of VMs (server - xp_sp3, client - xp_sp1) i found the client port, then the server's SND.NEXT and using it the clients SND.NEXT (i have compared all of them with wireshark and they are legit).
now when sending a spoofed packet to the server from the client, using the client's SND.NEXT i see that the packet does arive to the server, but not to the NetCat(it's destination), plus when i compare it to a real client packet it look nearly the same (different mac, ttl, window-size, ect.)
is there anything else that i should do to make the packet look legit to the server beside what i have done?