Spoofing, Proxies, hacking/cracking, What is the truth?
Page 1 of 2 12 LastLast
Results 1 to 10 of 11

Thread: Spoofing, Proxies, hacking/cracking, What is the truth?

  1. #1

    Question Spoofing, Proxies, hacking/cracking, What is the truth?

    Ok I have read several posts and talked with those on the irc channel.

    If there is no way to hide your IP or proxy it then how do people still hack? Is this a matter of finding servers that just have poor security and poor logging? Do the crackers or hackers erase their tracks in the logs or use some type of backdoor?

    With all the hacks/cracks going on what I don't understand is if their IP has not been faked how come they are not traced?

    Is this why we are seeing an increase in worms and trojans because they are bounced so many times that tracing them back is almost impossible?

    This is just to get started and understand how people are still breaking into computers when they can be traced.
    Share on Google+

  2. #2
    Senior Member
    Join Date
    Sep 2001
    Posts
    412

    spoofing

    It certainly is possible to spoof your ip, everyone's best friend - NMAP, has a nice way of bouncing packets off any ip/hostname - people can get quite confused when thier software firewall tells them www.altalavista.com is scanning them!!
    Share on Google+

  3. #3
    All that is it simple IP packet header forging, not "bouncing" or any sort of relaying. No program can control the packet routing of another machine unless that machine knowingly accpets the rerouted connect. So, I would hardly call that a "spoof". You can't complete a TCP socket connection with that method of scanning.

    All it does is create a RAW packet and set the src_ip in sockaddr struct (For us C programmers) to whatever you want. By no means is that an effective "spoof".

    Not to mention that most routers will drop packets that the source header is not of a subnet that they route to. Which means, if you're in blah.rr.com, and try to spoof, altavista's IP, TimeWarner's router will kill your packet before it even gets to it's destination.. yet again.. not effective..

    Personal note: petemcevoy, you should drop by irc.Antionline.com in #Antionline, I feel we would have some great discussions.
    Jason Parker - http://www.o-negative.net
    o-Negative: Information Network
    Share on Google+

  4. #4

    Ok but what about my original ??'s

    If there is no way to hide your IP or proxy it then how do people still hack? Is this a matter of finding servers that just have poor security and poor logging? Do the crackers or hackers erase their tracks in the logs or use some type of backdoor?
    With all the hacks/cracks going on what I don't understand is if their IP has not been faked how come they are not traced?
    Is this why we are seeing an increase in worms and trojans because they are bounced so many times that tracing them back is almost impossible?
    This is just to get started and understand how people are still breaking into computers when they can be traced.
    Share on Google+

  5. #5
    Hacking has nothing to do with being able to spoof. People jsut "assume" that if they hack a server, they won't be caught. Muttster posted informative article about being traced. You will get caught if someone cares enough to catch you.

    Oh well..
    Jason Parker - http://www.o-negative.net
    o-Negative: Information Network
    Share on Google+

  6. #6
    Senior Member
    Join Date
    Sep 2001
    Posts
    412

    spoofing

    Those are all fair points you made jparker, but in my defence i was just giving an example of how somebody who may want to seem "l33t" could fool a software firewall (say, blackice defender) into thinking that the scan was originating from somewhere else. Its my opinion that something as complicated as disabling a host in order to use its ip for your own nefarious reasons is well beyond the scope of this thread.

    I'll speak to you IRC style soon.
    Share on Google+

  7. #7

    Proxys, SOCKS, and Anonymity

    Greetings all. I was wondering what the difference was between all these different methods of hideing yer IP address,DNS address, or what ever it is that u are trying to hide. What methods are used, how they are traced, and what do u suggest to use for anonimity on the web. Latr--
    Remote_Access_
    Share on Google+

  8. #8
    Member
    Join Date
    Aug 2001
    Posts
    45

    Watch out!

    I have to go with "buddy" who said that If someone cares enough to catch you they will. From Ip to other forms of tracking, there are mad Progs out there to "hunt" down someone. But If you just want to hide your Ip addy, you can go to www.download.com and type In Ip hide. You might find somestuff....
    Share on Google+

  9. #9

    Re: Proxys, SOCKS, and Anonymity

    Originally posted by Remote_Access_
    Greetings all. I was wondering what the difference was between all these different methods of hideing yer IP address,DNS address, or what ever it is that u are trying to hide. What methods are used, how they are traced, and what do u suggest to use for anonimity on the web. Latr--
    Remote_Access_
    Remote: I've written an article in this section of the forums on IP Spoofing.
    Jason Parker - http://www.o-negative.net
    o-Negative: Information Network
    Share on Google+

  10. #10

    Parker:

    Ok i didnt have enought time to read it last night, but i'll go check it out latr today. thx parker. latr--
    Remote_
    Share on Google+

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •