trallat_private <mailto:trallat_private> > >How is it the case then, is it possible to just use IP spoofing to penetrate >a system? IP spoofing without ISN prediction can be used to mount a SYN attack, with these benefits from the attacker's standpoint: * It can allow the packets through filters that limit where connections can be initiated from Other than the monotonous SYN/DoS Attacks and hiding the IP address of the attacker, how can IP spoofing be used to bind a shell to a port, whether that be in Unix or NT? Or better still, how could the payload of the datagram be programmed to hold the instruction set to connect to rsh, and cause a buffer overflow or some other security breech? Cheers r. Richard Scott (I.S.) E-Commerce Team *Tel: 001-(612)-995-5432 * Fax: 001-(612)-947-2005 * Best Buy World Headquarters 7075 Flying Cloud Drive Eden Prairie, MN 55344 USA This '|' is not a pipe
This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 13:42:14 PDT