LinuxQuestions.org
Visit Jeremy's Blog.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Newbie
User Name
Password
Linux - Newbie This Linux forum is for members that are new to Linux.
Just starting out and have a question? If it is not in the man pages or the how-to's this is the place!

Notices


Reply
  Search this Thread
Old 03-30-2005, 11:49 PM   #1
veeruk101
Member
 
Registered: Mar 2005
Distribution: Ubuntu 12.04 LTS
Posts: 249

Rep: Reputation: 16
How do people spoof your name and IP address?


I was reading a tutorial that has mentioned a few times about intruders that may try to spoof your name and/or IP address...how do they do that?

I imagine they could spoof your name by modifying the etc/hosts file of everybody that tries to access your site? Haha, is that what they actually do? So I guess my question still stands about how they spoof a name.

And how in the world do they spoof an IP address? This one just blows my mind! With my limited knowledge on these matters, how do they actually spoof an IP address? I thought an IP address was not spoofable, though the name that points to it very well might be.

Thanks a lot, any insight on these questions would be awesome!
 
Old 03-31-2005, 01:14 AM   #2
sgrayban
Member
 
Registered: Nov 2004
Location: Spokane, WA
Distribution: Debian 6.0
Posts: 369

Rep: Reputation: 30
the answer that could be given can also be used for hacking/illegal use so your on your own for the answer to this.
 
Old 03-31-2005, 01:35 AM   #3
dalek
Senior Member
 
Registered: Jul 2003
Location: Mississippi USA
Distribution: Gentoo
Posts: 2,058
Blog Entries: 2

Rep: Reputation: 79
This is one of those it would be neat to know but someone may come along and do something they shouldn't with the info. I would like to know how they do that too but understand why nobody says how. May can get someone to email you a answer though. Just don't make it public. No need adding fuel to the fire. It's big enough already.

Later



PS, "raindrops falling on my head". Raining again. My garden is officially a swamp now.
 
Old 03-31-2005, 02:12 AM   #4
scuzzman
Senior Member
 
Registered: May 2004
Location: Hilliard, Ohio, USA
Distribution: Slackware, Kubuntu
Posts: 1,851

Rep: Reputation: 47
I'll add this: you will want to investigate "raw socket programming" and it should yield the proper results.
 
Old 03-31-2005, 03:29 AM   #5
njugs79
Member
 
Registered: Jan 2005
Posts: 37

Rep: Reputation: 15
Interesting topic..but like someone mentioned "it could be used for malicious intentions". However, if one were to really put on "another hat" other than a black hat, then there are a myriad of resources out there on the net on how it is exactly done, right down to the journey of a spoofed packet. IP address spoofing can be defined as the intentional misrepresentation of the source IP address in an IP packet in order to conceal the identity of the sender or to impersonate another computing system. One use this to obtain IP address information for a targetted computing system. My input is this, just google the subject and research..."no harmful effects intended!!!!!!!"
 
Old 03-31-2005, 04:47 AM   #6
MasterC
LQ Guru
 
Registered: Mar 2002
Location: Salt Lake City, UT - USA
Distribution: Gentoo ; LFS ; Kubuntu
Posts: 12,612

Rep: Reputation: 64
Moved: This thread is more suitable in Linux - Security and has been moved accordingly to help your thread/question get the exposure it deserves.

Good Luck!

Cool
 
Old 04-06-2005, 10:03 PM   #7
Ken1015
LQ Newbie
 
Registered: Mar 2005
Location: Chicago, IL
Distribution: SuSE 9.2 Pro
Posts: 11

Rep: Reputation: 0
One can explain IP spoofing without providing step-by-step instructions. I can provide a very basic explanation. IP spoofing is generally done one of two ways. The simplest way is to use a proxy server that changes the IP address. In this attack, the abuser first establishes a connection with a proxy server then establishes a connection with the victim. At that point, the victim only sees the IP address of the proxy server and not the real address of the abuser.

The second version of IP spoofing is much more complicated. It's also known as a sequence number prediction attack. This attack requires that the abuser guess the initial sequence number used in establishing the TCP connection and then injecting TCP packets that appear to be part of a legitimate connection.

Those explanations are paraphrased from the textbook I'm using in a web security class I'm taking and it is all I know about IP spoofing.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
How can I get people to use Linux? I'm bad at converting people over. Mr. Hill Linux - Newbie 31 10-19-2008 10:16 AM
How to spoof the ip ! Anafura Linux - General 2 01-02-2005 07:14 PM
How do I spoof a MAC address? ptp Linux - Networking 7 02-25-2004 08:15 PM
finding people MAC address over localnet gregram Linux - Networking 1 08-18-2003 09:38 AM
How to spoof our ip?? zLinuxz Linux - Networking 2 04-19-2002 12:00 PM


All times are GMT -5. The time now is 04:18 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration