Hi
from another site
Examples of spoofing:
man-in-the-middle
packet sniffs on link between the two end points, and can therefore pretend to be one end of the connection
routing redirect
redirects routing information from the original host to the hacker's host (this is another form of man-in-the-middle attack).
source routing
redirects indvidual packets by hackers host
blind spoofing
predicts responses from a host, allowing commands to be sent, but can't get immediate feedback.
flooding
SYN flood fills up receive queue from random source addresses; smurf/fraggle spoofs victims address, causing everyong respond to the victim.
Why? That's the (or my) question.
What's your next question? Is it illegal to send spam? Please tell me how to spam people.
Please don't use my IP when you try different technics. And then, please don't spam me.
__________________
unicorn
|