No, that was SirDice's point. You send out a false address and the response comes back to the false address, so you never get to see it.;)Quote:
Say I use a Fake IP address and that IP address does exist in the real world. Now is it possible that if some trojan be installed on the computer whose IP has been spoofed, would I come to know the rsponse from the server.... and then delete the logs from the spoofed computer
EDIT: There are two concepts here which I will crudely explain:
1. "Spoofing" = appearing to be something that it is not.
2. "Anonymous" = not being traceable to the true originating individual.
#1 is about addresses whilst #2 is about people.
So, if I go and connect to one of the free wirless hotspots in my town, I am to all intents and purposes anonymous and legally connected. If I leech someone's unsecured wireless connection I am still anonymous unless I am "caught in the act" (physically), but what I am doing may well be illegal, depending on local legislation.
I am using a perfectly normal and valid address that is not spoofed, in both of those cases. The identity will trace back to the owner of the facility, and not the user.
A trojan using a compromised computer is doing the same. It is using perfectly valid and legitimate resources but without permission.
A "legal" form of the trojan scenario would be an anonymous proxy. In that situation, the identity would trace back to the proxy in the first instance.
If I send a spoofed address, anything trying to respond will use that address. If the address does not exist the response will fail. If the address is genuine but is offline, that will fail.............if it is online it should be blocked/dropped because it did not send a request to which the response relates.