Tuesday, March 20, 2012

IP Address Spoofing

DOS attacks (and DDOS) - the use of Spoofed IP addresses .

The SANS Institute paper, which I cannot re-post a quote from (they request that you don't),  talks about the methods by which an attacker can, with root access on a Unix system, open a Raw Socket and can assemble a header so that it looks like it is a connection from any source that the hacker wishes.

1 comment:

  1. How do I make an attack on a server look like it is being made from an IP that I am trying to discredit?

    ReplyDelete

Please do not enter links that are just promoting your own website or ones to those that you are shilling.
Comments with hyperlinks (that are not relevant to the original post) will be re-posted or deleted.
Sorry, this is to discourage "blog spam"