Firewall Wizards mailing list archives

Re: IP Spoofing


From: "Ryan Russell" <Ryan.Russell () sybase com>
Date: Sat, 2 Oct 1999 23:10:21 -0700




How is it the case then, is it possible to just use IP spoofing to penetrate
a system?

There are DNS poison attacks that are done via UDP.  I don't know if
that counts as a penetration attack in your book, but it's not a simple
DoS attack.  TCP is not the only IP protocol that can be spoofed, just
the hardest.  (Well, not counting cyrptographically signed protocols :) )

                              Ryan






Current thread: