[Dshield] RE: (Dshield) Reserved Addresses

Jeff Miller jrm.wa at verizon.net
Sun Mar 10 23:50:06 GMT 2002


Good point, I'm not sure.  I've never attempted to spoof packets, so I'm not
sure how they could insert a bogus source, and still get a reply.  Maybe
they can't, at which point the attack is pretty useless.  Does anyone know
how this is actually done?

-----Original Message-----
From: list-admin at dshield.org [mailto:list-admin at dshield.org]On Behalf Of
Clint Byrum
Sent: Sunday, March 10, 2002 11:33 AM
To: list at dshield.org
Subject: RE: [Dshield] RE: (Dshield) Reserved Addresses


On Sat, 2002-03-09 at 09:01, Jeff Miller wrote:
> Using tools such as NMAP, which can insert the address of your choice.
>

Yes but what does that accomplish if you're not sniffing on the return
path? and since the private address bound replies will most certainly
get dropped by the target's ISP(if not their firewall), the return path
is pretty short.

> -----Original Message-----
> From: list-admin at dshield.org [mailto:list-admin at dshield.org]On Behalf Of
> Mrcorp
> Sent: Saturday, March 09, 2002 5:55 AM
> To: list at dshield.org
> Subject: RE: [Dshield] RE: (Dshield) Reserved Addresses
>
>
> how does one perform a port scan using spoofed packets?
>
> mrcorp
--

------------------------------
Clint Byrum
ERP.COM

_______________________________________________
Dshield mailing list
Dshield at dshield.org
To change your subscription options (or unsubscribe), see:
http://www.dshield.org/mailman/listinfo/list




More information about the list mailing list