Well, yeah, you can't totally hide, but you will need the cooperation of each of the host computers that they are connecting through. From the victim's point of view, however, she can't find the final destination of the hacker because that information is not passed through (the Naval War College, for the purposes here, IS the final destination) If the hackers are good, they use international links (such as here)to decrease the likelihood that people will track it totally down.
-----Original Message----- From: Jose Manzano [mailto:[EMAIL PROTECTED] Sent: Wednesday, April 09, 2003 10:57 AM To: NT 2000 Discussions Subject: RE: urgent I was led to believe that you can't completely spoof. To forge the source IP would mess up the connection and you wouldn't able to do anything. You can trace usually by going from router to router and checking the logs? And sometimes depending on the type of spoof and what u use to monitor the attacks you can tell what network it really came from? I'm no security expert... this is what I was told... -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: Wednesday, April 09, 2003 10:10 AM To: NT 2000 Discussions Subject: RE: urgent On Wed, 9 Apr 2003, at 9:23am, [EMAIL PROTECTED] wrote: > On Wed, 9 Apr 2003, at 8:55am, [EMAIL PROTECTED] wrote: > > Could be ..it depends where she got those IP's from .... Some monitoring > > software actually logs the true hardware address of the origin of the > > attacks. > > Neat trick over the Internet. > > What u mean Ben ? Unless the attack is coming from the same layer two network you are attached to, there is no general way to trace a hardware address over the Internet. The hardware address is not transmitted in any IP, TCP, UDP, or ICMP datagram. It can only be obtained from a layer two frame, which is not passwd between routers. -- Ben Scott <[EMAIL PROTECTED]> | The opinions expressed in this message are those of the author and do | | not represent the views or policy of any other person or organization. | | All information is provided without warranty of any kind. | ------ You are subscribed as [EMAIL PROTECTED] Archives: http://www.swynk.com/sitesearch/search.asp To unsubscribe send a blank email to %%email.unsub%% ------ You are subscribed as [EMAIL PROTECTED] Archives: http://www.swynk.com/sitesearch/search.asp To unsubscribe send a blank email to %%email.unsub%% **************************************************************************** This e-mail and any attachment may contain information that is proprietary, privileged, confidential or subject to copyright belonging to Conectiv or its subsidiaries (Conectiv). This e-mail is intended solely for the use of the person to which it is addressed. If you are not the intended recipient of this email, you are hereby notified that any dissemination, distribution, copying or other action taken in relation to the contents of and attachments to this e-mail is prohibited and may be unlawful. If you have received this e-mail in error, please notify the sender immediately and permanently delete the original and any copy of this e-mail and any printout. Conectiv policy expressly prohibits employees from making Defamatory or offensive statements and infringing any copyright or any other legal right by email communications. Conectiv will not accept any liability in respect of such communications. The employee responsible will be personally liable for any damages or other liability so arising. **************************************************************************** ------ You are subscribed as [EMAIL PROTECTED] Archives: http://www.swynk.com/sitesearch/search.asp To unsubscribe send a blank email to [EMAIL PROTECTED]
