Security Basics mailing list archives
Re: Identifying Intrusions?
From: fskrc1 () hotmail com
Date: 25 Apr 2007 11:20:07 -0000
Are you using a SEM/SIM for viewing this data? If a source IP and MAC are spoofed then I'm unsure how the account would be compromised since the purpose of a compromise would be to send traffic back to the attacker. A spoofed IP is a one way communication from source to destination (unless its used for DoS)as any return data would be sent to the spoofed IP and not the real IP.
Current thread:
- Identifying Intrusions? donald . shroyer (Apr 24)
- <Possible follow-ups>
- Re: Identifying Intrusions? Lord Bane (Apr 25)
- Re: Identifying Intrusions? fskrc1 (Apr 25)