Firewall Wizards mailing list archives

Re: IP Spoofing


From: trall () almaden ibm com
Date: Sat, 2 Oct 1999 17:48:32 -0700



How is it the case then, is it possible to just use IP spoofing to penetrate
a system?

IP spoofing without ISN prediction can be used to mount a SYN attack, with these
benefits from the attacker's standpoint:

* It hides the attacker's identity
* It can allow the packets through filters that limit where connections can be
initiated from

Tony Rall




Current thread: