![]() |
IS spoofing an IP illegal?
If not, could someone please explain how the whole thing works? I know you somehow fool your Computer to send out packets with modified IP addresses. I would be very grateful if someone would help me figure out this concept. ~:king:Merlyn:king:~ |
Hi
from another site Examples of spoofing: man-in-the-middle packet sniffs on link between the two end points, and can therefore pretend to be one end of the connection routing redirect redirects routing information from the original host to the hacker's host (this is another form of man-in-the-middle attack). source routing redirects indvidual packets by hackers host blind spoofing predicts responses from a host, allowing commands to be sent, but can't get immediate feedback. flooding SYN flood fills up receive queue from random source addresses; smurf/fraggle spoofs victims address, causing everyong respond to the victim. Why? That's the (or my) question. What's your next question? Is it illegal to send spam? Please tell me how to spam people. Please don't use my IP when you try different technics. And then, please don't spam me. |
So you need some sort of proxy, or router? Or just another connection? I'm doing this to prove to a person im geekier than he is..and want to leave him in the dust.
I get the concept, but HOW? I dont spam, unless people piss me off. Thanks ~:king:Merlyn:king:~ |
We here at BetaONE do not condone illegal activities, please refrain from asking how to committ them, 'cause the next you do, you just might have to go away for a while. ;)
|
I would say dont mess with it, its gaining unauthorized access to someones computer... which from what I know isnt something the law may like...
Quote:
|
IP spoofing is a good concept to learn, but NEVER use. Much like other arts of fighting, the hacker uses his/her skill to hurt anyone EVER.
But I don't need to harp on that stuff.. silly as it might be. Cybey |
So it is illegal? :(
I didn't know if it was illegal, so I ASKED <_< I read a guide, and get the picture now..but, Is it illegal? :unsure: ~Merlyn~ |
Situation 1:
You have a few computers that you own on YOUR local network that you own and you spoof ip's for fun and knowledge. Legal Situation 2: You try to spoof ip's of computers that someone else owns in order to gain access to them. Illegal Hope this helps some ;) /JD |
Quote:
Source: http://websearch.about.com/library/g...p-spoofing.htm |
Thanks, I understand it now. If someone could close or get rid of this post unless someone else has something to contribute. Thanks for all your help!
~Merlyn~ |
hXXp://www.si.umich.edu/Classes/540/Readings/IP-spoof.htm
There you go. But take the above advice and dont play with fire outside of your own network. |
Quote:
|
Quote:
Secondly, spoofing is only useful with UDP packets and ICMP. These packets are sent to a host without a connection as such being established. The majority of protocols use TCP, whereby data is only exchanged after both sides negotiate a connection. If you need to open a TCP connection, you must send a request, and the remote host sends you back an ACKWNOWLEDGE packet - this is why TCP connections cannot be spoofed - the packet will not be received by you but by whomever's source address you faked, and will simply be ignored. As to the issue of legality/morality, spoofing simply comes down to sending a custom packet over a network. It is in no way illegal or immoral. It is what you use the technique for that causes problems. If you use it to flood a host with an attack and try to hide your real identity, it is both illegal and immoral. However this does not mean that you arent entitled to know the basic concepts. As with anything spoofing has a lot of very important and good uses. For example if you use a NAT/gateway to connect to the internet. They work by spoofing packets that look to your computer as if they are from the remote host, and modifying your replies so the remote host thinks your NAT box initiated the connection. This way you can connect 'transparently' with networks you arent directly connected to. If it wasnt for packet spoofing, the remote computer would think "192.168.0.10" or whatever is connecting to it, replies would be lost, and the thing would just collapse. The term spoofing just means sending a packet with a custom source address - nothing illegal! If you combine spoofing with a network attack, the spoofing part isnt illegal, but the "attack" part is. |
All times are GMT +1. The time now is 08:45 PM. |
Powered by vBulletin® Version 3.6.5
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.