IP Spoofing Tools
Results 1 to 8 of 8

Thread: IP Spoofing Tools

  1. #1
    Junior Member
    Join Date
    Jan 2005
    Posts
    3

    IP Spoofing Tools

    Hey does anyone know where to get any decent IP spoofing tools from.

    Greatly appreciated.
    -ExO-

  2. #2
    Senior Member
    Join Date
    Jun 2004
    Posts
    379
    1. why would you need a tool like this.
    2. when asking for tool that are for nothing but to be used to do harm it must be a good and Believable reason
    3. no one here will give you a tool like that here wityh out a good valid reason
    4. if you want to spoof an ip address you dont just get a tool like LC4 or something and it dose it for you you need to mess with the packet hedders and also you know you wont be able to keep a connection to something wile spoofing you ip you could just send packets you wont recive any,

  3. #3
    King Tutorial-ankhamun
    Join Date
    Jul 2004
    Posts
    897
    Describe what you are trying to do so we can point you to something (if valid). You may want to look at Arp Spoofing insead if you are on the same LAN/Subnet.

  4. #4
    Senior Member
    Join Date
    Mar 2003
    Posts
    452
    If you'd like a tool to determine if your proxy is keeping you anonymous, you should try this Proxy Checker Tool

    Hope it helps

    PuRe
    Like this post? Visit PuRe\'s Information Technology Community. We\'ve also got some kick ass Technology Forums. Shop for books and dvds on LiveWebShop.com

  5. #5
    BANNED
    Join Date
    Nov 2003
    Location
    San Diego
    Posts
    724
    IP spoofing isn't really used to keep you anonymous while you surf.
    http://www.iss.net/security_center/a...ng/default.htm
    http://www.securityfocus.com/infocus/1674
    When death sleeps it dreams of you...

  6. #6
    Junior Member
    Join Date
    Jan 2005
    Posts
    3
    Right......I work for a company that deals with computer training, i only just joined as a Network technician but realised that the whole place was so insecure that a 3 year old could of broken in. So i have undertaken the task of trying to find the vulnerabilities for them and write them up in a report so that the Network Manager can sort them out.

    I am trying to use spoofing as one of the methods to show that as one of the ways to access. I already played around with things like DOS and even proved that with the stupid people there that reviece files they dont know, used trojans (that made me laugh).

    I am not bothered about leaving my IP address there at all as they know it now anyway (after playing around with a seriously buggy Sendmail)

    Any help is appreciated.....its just that i only know the basics and wanted to know of any good tools for the job.
    -ExO-

  7. #7
    Senior Member
    Join Date
    Mar 2004
    Posts
    557
    Hi

    If you want/have to write a vulnerability report, why aren't you using a tool
    that is created to do that, like

    nessus[1]
    retina[2]

    These two programs, just to name the two most well-known ones, will
    provide you with much more information, that you can achieve yourself
    while playing around, and even create a decent report for you.

    You may also have a read here[3].

    Cheers

    [1] http://www.nessus.org/
    [2] http://www.eeye.com/html/products/retina/
    [3] http://www.nwc.com/1201/1201f1b1.html
    If the only tool you have is a hammer, you tend to see every problem as a nail.
    (Abraham Maslow, Psychologist, 1908-70)

  8. #8
    Junior Member
    Join Date
    Jan 2005
    Posts
    3
    Oh yeah i do agree that is a good way. I just wanted to prove to my manager that anyone could do it. But hey nevermind.

    Thanks for all the help guys....lot of informing reading there.
    -ExO-

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •