Well, yeah, you can't totally hide, but you will need the cooperation of
each of the host computers that they are connecting through. From the
victim's point of view, however, she can't find the final destination of the
hacker because that information is not passed through (the Naval War
College, for the purposes here, IS the final destination)   If the hackers
are good, they use international links (such as here)to decrease the
likelihood that people will track it totally down. 

-----Original Message-----
From: Jose Manzano [mailto:[EMAIL PROTECTED]
Sent: Wednesday, April 09, 2003 10:57 AM
To: NT 2000 Discussions
Subject: RE: urgent


  I was led to believe that you can't completely spoof. To forge the source
IP would mess up the connection and you wouldn't able to do anything. You
can trace usually by going from router to router and checking the logs? And
sometimes depending on the type of spoof and what u use to monitor the
attacks you can tell what network it really came from?

  I'm no security expert... this is what I was told... 
 
-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, April 09, 2003 10:10 AM
To: NT 2000 Discussions
Subject: RE: urgent

On Wed, 9 Apr 2003, at 9:23am, [EMAIL PROTECTED] wrote:
> On Wed, 9 Apr 2003, at 8:55am, [EMAIL PROTECTED] wrote:
> >  Could be ..it depends where she got those IP's from .... Some
monitoring
> > software actually logs the true hardware address of the origin of the
> > attacks. 
> 
>   Neat trick over the Internet.
>
>  What u mean Ben ?

  Unless the attack is coming from the same layer two network you are
attached to, there is no general way to trace a hardware address over the
Internet.  The hardware address is not transmitted in any IP, TCP, UDP, or
ICMP datagram.  It can only be obtained from a layer two frame, which is not
passwd between routers.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do  |
| not represent the views or policy of any other person or organization. |
| All information is provided without warranty of any kind.              |



------
You are subscribed as [EMAIL PROTECTED]
Archives: http://www.swynk.com/sitesearch/search.asp
To unsubscribe send a blank email to %%email.unsub%%

------
You are subscribed as [EMAIL PROTECTED]
Archives: http://www.swynk.com/sitesearch/search.asp
To unsubscribe send a blank email to %%email.unsub%%
****************************************************************************
This e-mail and any attachment may contain information that is proprietary,
privileged, confidential  or subject to copyright belonging to Conectiv or
its subsidiaries (Conectiv). This e-mail is intended solely for the use of
the person to which it is addressed.  If you are not the intended recipient
of this email, you are hereby notified that any dissemination, distribution,
copying or other action taken in relation to the contents of and attachments
to this e-mail is prohibited and may be unlawful.  If you have received this
e-mail in error, please notify the sender immediately and permanently delete
the original and any copy of this e-mail and any printout.  Conectiv policy
expressly prohibits employees from making Defamatory or offensive statements
and infringing any copyright or any other legal right by email
communications.  Conectiv will not accept any liability in respect of such
communications. The employee responsible will be personally liable for any
damages or other liability so arising.
****************************************************************************


------
You are subscribed as [EMAIL PROTECTED]
Archives: http://www.swynk.com/sitesearch/search.asp
To unsubscribe send a blank email to [EMAIL PROTECTED]

Reply via email to