[Dshield] RE: (Dshield) Reserved Addresses
jrm.wa at verizon.net
Sun Mar 10 23:50:06 GMT 2002
Good point, I'm not sure. I've never attempted to spoof packets, so I'm not
sure how they could insert a bogus source, and still get a reply. Maybe
they can't, at which point the attack is pretty useless. Does anyone know
how this is actually done?
From: list-admin at dshield.org [mailto:list-admin at dshield.org]On Behalf Of
Sent: Sunday, March 10, 2002 11:33 AM
To: list at dshield.org
Subject: RE: [Dshield] RE: (Dshield) Reserved Addresses
On Sat, 2002-03-09 at 09:01, Jeff Miller wrote:
> Using tools such as NMAP, which can insert the address of your choice.
Yes but what does that accomplish if you're not sniffing on the return
path? and since the private address bound replies will most certainly
get dropped by the target's ISP(if not their firewall), the return path
is pretty short.
> -----Original Message-----
> From: list-admin at dshield.org [mailto:list-admin at dshield.org]On Behalf Of
> Sent: Saturday, March 09, 2002 5:55 AM
> To: list at dshield.org
> Subject: RE: [Dshield] RE: (Dshield) Reserved Addresses
> how does one perform a port scan using spoofed packets?
Dshield mailing list
Dshield at dshield.org
To change your subscription options (or unsubscribe), see:
More information about the list