BetaONE will rise again!

BetaONE will rise again! (http:\\b1.hcanet.com\forum/index.php)
-   Internet Security and Privacy (http:\\b1.hcanet.com\forum/forumdisplay.php?f=38)
-   -   Spoofing (http:\\b1.hcanet.com\forum/showthread.php?t=8165)

scathe skeleton 24th May 03 06:44 PM

IS spoofing an IP illegal?

If not, could someone please explain how the whole thing works? I know you somehow fool your Computer to send out packets with modified IP addresses.

I would be very grateful if someone would help me figure out this concept.

~:king:Merlyn:king:~

unicorn 24th May 03 11:11 PM

Hi

from another site
Examples of spoofing:
man-in-the-middle
packet sniffs on link between the two end points, and can therefore pretend to be one end of the connection
routing redirect
redirects routing information from the original host to the hacker's host (this is another form of man-in-the-middle attack).
source routing
redirects indvidual packets by hackers host
blind spoofing
predicts responses from a host, allowing commands to be sent, but can't get immediate feedback.
flooding
SYN flood fills up receive queue from random source addresses; smurf/fraggle spoofs victims address, causing everyong respond to the victim.


Why? That's the (or my) question.

What's your next question? Is it illegal to send spam? Please tell me how to spam people.

Please don't use my IP when you try different technics. And then, please don't spam me.

scathe skeleton 25th May 03 06:19 AM

So you need some sort of proxy, or router? Or just another connection? I'm doing this to prove to a person im geekier than he is..and want to leave him in the dust.

I get the concept, but HOW?

I dont spam, unless people piss me off.
Thanks
~:king:Merlyn:king:~

Jarod888 27th May 03 06:44 AM

We here at BetaONE do not condone illegal activities, please refrain from asking how to committ them, 'cause the next you do, you just might have to go away for a while. ;)

[SiN] 27th May 03 06:50 AM

I would say dont mess with it, its gaining unauthorized access to someones computer... which from what I know isnt something the law may like...

Quote:


IP SPOOFING

A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. To engage in IP spoofing, a hacker must first use a variety of techniques to find an IP address of a trusted host and then modify the packet headers so that it appears that the packets are coming from that host.
Newer routers and firewall arrangements can offer protection against IP spoofing.
http://www.webopedia.com/TERM/I/IP_spoofing.html

the definition should sound geeky enough to explain to yer friend.

Cyberion 31st May 03 01:19 AM

IP spoofing is a good concept to learn, but NEVER use. Much like other arts of fighting, the hacker uses his/her skill to hurt anyone EVER.

But I don't need to harp on that stuff.. silly as it might be.

Cybey

scathe skeleton 31st May 03 11:11 AM

So it is illegal? :(
I didn't know if it was illegal, so I ASKED <_<

I read a guide, and get the picture now..but,
Is it illegal? :unsure:

~Merlyn~

JacKDynne 31st May 03 11:28 AM

Situation 1:

You have a few computers that you own on YOUR local network that you own and you spoof ip's for fun and knowledge. Legal

Situation 2:

You try to spoof ip's of computers that someone else owns in order to gain access to them. Illegal

Hope this helps some ;)

/JD

KingCobra 31st May 03 11:32 AM

Quote:

Definition: A method of connecting to the Internet or a particular web site and reporting a different IP Address than your assigned one. IP Spoofing is used in SEO in order to trick a spider into indexing one site, while actually presenting another site to the end user. This tactic can also be used to redirect a user to a site other than the one they have clicked on.

This tactic is considered highly unethical and is illegal in some areas.



Source:
http://websearch.about.com/library/g...p-spoofing.htm

scathe skeleton 31st May 03 11:48 PM

Thanks, I understand it now. If someone could close or get rid of this post unless someone else has something to contribute. Thanks for all your help!

~Merlyn~

just_do_IT 3rd Jun 03 05:30 AM

hXXp://www.si.umich.edu/Classes/540/Readings/IP-spoof.htm

There you go. But take the above advice and dont play with fire outside of your own network.

KingCobra 3rd Jun 03 09:48 AM

Quote:

Thanks, I understand it now. If someone could close or get rid of this post unless someone else has something to contribute. Thanks for all your help!

~Merlyn~

As you request...Thread Closed. :)

Zone-MR 3rd Jun 03 10:49 AM

Quote:

Thanks, I understand it now. If someone could close or get rid of this post unless someone else has something to contribute.
I have. The concept of spoofing an IP address is very simple in principle. When your computer sends any packet over the internet, it contains headers with information about the packet. Two important headers are the "source" and "destination" of the packet. Spoofing simply means getting software to send packets with a fake source.

Secondly, spoofing is only useful with UDP packets and ICMP. These packets are sent to a host without a connection as such being established. The majority of protocols use TCP, whereby data is only exchanged after both sides negotiate a connection. If you need to open a TCP connection, you must send a request, and the remote host sends you back an ACKWNOWLEDGE packet - this is why TCP connections cannot be spoofed - the packet will not be received by you but by whomever's source address you faked, and will simply be ignored.

As to the issue of legality/morality, spoofing simply comes down to sending a custom packet over a network. It is in no way illegal or immoral. It is what you use the technique for that causes problems. If you use it to flood a host with an attack and try to hide your real identity, it is both illegal and immoral. However this does not mean that you arent entitled to know the basic concepts.

As with anything spoofing has a lot of very important and good uses. For example if you use a NAT/gateway to connect to the internet. They work by spoofing packets that look to your computer as if they are from the remote host, and modifying your replies so the remote host thinks your NAT box initiated the connection. This way you can connect 'transparently' with networks you arent directly connected to. If it wasnt for packet spoofing, the remote computer would think "192.168.0.10" or whatever is connecting to it, replies would be lost, and the thing would just collapse. The term spoofing just means sending a packet with a custom source address - nothing illegal! If you combine spoofing with a network attack, the spoofing part isnt illegal, but the "attack" part is.


All times are GMT +1. The time now is 08:45 PM.

Powered by vBulletin® Version 3.6.5
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.