Check out Ian Vitek's talk on IP spoofing and source routing for DefCon 8.

http://www.defcon.org/defcon-media-archives-defcon.html

But "source routing" is your simple answer... Assuming the target accepts
source routed packets (my systems don't ;).

Otherwise, you don't see what you get back, which is the way it used to be
done. You'd have to DoS the system you were spoofing so that it wouldn't
send back a reset to your target. And unless you could sniff the traffic,
you pretty much had to guess what it was sending.

-G_E


> -----Original Message-----
> From: Dee Harrod [mailto:[EMAIL PROTECTED]]
> Sent: Tuesday, November 27, 2001 12:18 PM
> To: SecurityBasics
> Subject: Spoofing question?
>
>
> How does spoofing work?
>
> If I change the source address of my outbound packet,
> how do I get the response? How does it get back to me?
>
> -- Dee
>
> __________________________________________________
> Do You Yahoo!?
> Yahoo! GeoCities - quick and easy web site hosting, just $8.95/month.
> http://geocities.yahoo.com/ps/info1
>


Reply via email to