Firewall Wizards mailing list archives
Re: IP Spoofing
From: trall () almaden ibm com
Date: Sat, 2 Oct 1999 17:48:32 -0700
How is it the case then, is it possible to just use IP spoofing to penetrate a system?
IP spoofing without ISN prediction can be used to mount a SYN attack, with these benefits from the attacker's standpoint: * It hides the attacker's identity * It can allow the packets through filters that limit where connections can be initiated from Tony Rall
Current thread:
- IP Spoofing Scott, Richard (Oct 02)
- Re: IP Spoofing Ivan Arce (Oct 05)
- <Possible follow-ups>
- Re: IP Spoofing trall (Oct 04)
- Re: IP Spoofing Ryan Russell (Oct 04)
- RE: IP Spoofing Scott, Richard (Oct 05)