RE: IP Spoofing

From: Scott, Richard (Richard.Scottat_private)
Date: Mon Oct 04 1999 - 08:20:34 PDT

  • Next message: Gregory Blake: "Re: BigIP controller - any issues?"

    	trallat_private <mailto:trallat_private> >
    
    	>How is it the case then, is it possible to just use IP spoofing to
    penetrate
    	>a system?
    
    	IP spoofing without ISN prediction can be used to mount a SYN
    attack, with these
    	benefits from the attacker's standpoint:
    
    	* It can allow the packets through filters that limit where
    connections can be
    	initiated from
    
    	Other than the monotonous SYN/DoS Attacks and hiding the IP address
    of the attacker, how can IP spoofing be used to bind a shell to a port,
    whether that be in Unix or NT?
    
    	Or better still, how could the payload of the datagram be programmed
    to hold the instruction set to connect to rsh, and cause a buffer overflow
    or some other security breech?
    
    	Cheers
    	r.
    	
    Richard Scott	
    (I.S.) E-Commerce Team
    *Tel: 001-(612)-995-5432
    * Fax: 001-(612)-947-2005
    * Best Buy World Headquarters
    7075 Flying Cloud Drive
    Eden Prairie, MN 55344 USA
    
    This '|' is not a pipe
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 13:42:14 PDT