Penetration Testing mailing list archives
Re: Tool for source routing
From: "Marius Huse Jacobsen" <mahuja () c2i net>
Date: Thu, 7 Jun 2001 16:11:28 +0200
That is, it should replace the source addr with a spoofed one, and add the real one as a source route.That implies that you're trying to spoof your source address, and get the victim machine to source-route back [to|through] the real attacker IP. It doesn't work that way. Only the originator of a packet gets to specify that source routing is on. I know of no way to force a victim to use source routing.
I believe at least some platforms place source routing opposite to the one used in the original packet. Which means they will more or less reverse the path taken by the original (attacker) packet.
Current thread:
- Tool for source routing Franklin DeMatto (Jun 03)
- Re: Tool for source routing Dug Song (Jun 03)
- Re: Tool for source routing Ryan Russell (Jun 03)
- Re: Tool for source routing Andrew Brown (Jun 03)
- Re: Tool for source routing Marius Huse Jacobsen (Jun 07)
- Re: Tool for source routing Dario Ciccarone (Jun 10)
- Re: Tool for source routing Jean-Christophe Touvet (Jun 05)
- Re: Tool for source routing Jason Witty, CISSP (Jun 08)
- <Possible follow-ups>
- Re: Tool for source routing ian . vitek (Jun 10)