-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > -----Original Message----- > From: Clarke, Paul [IT] [mailto:paul.clarkeat_private] > Sent: Tuesday, May 01, 2001 11:01 AM > > [...] > If there is a REAL 10.0.0.1 that's reachable by your victim on the > application port you're connecting to, then the SYN/ACK that > is sent to > 10.0.0.1 will get a RST response, which will tear down the > connection that > you're trying to establish. You'd have to use a spoofed > address that's not > reachable on this TCP port, or DOS 10.0.0.1 to make this work. Or simply poison the victims ARP cache with the MAC address of your station. Regards, Frank -----BEGIN PGP SIGNATURE----- Version: PGP Personal Privacy 6.5.8 Comment: PGP or S/MIME encrypted email preferred. iQA/AwUBOvATUJytSsEygtEFEQIIyQCgsNQeTGC6AjQup8nAu/9drzlf6sEAoJEF yXiq/1TXDJu5yOL93sT+X4YZ =no// -----END PGP SIGNATURE-----
This archive was generated by hypermail 2b30 : Thu May 03 2001 - 00:51:54 PDT