Firewall Wizards mailing list archives
Re: IP Spoofing
From: "Ryan Russell" <Ryan.Russell () sybase com>
Date: Sat, 2 Oct 1999 23:10:21 -0700
How is it the case then, is it possible to just use IP spoofing to penetrate a system?
There are DNS poison attacks that are done via UDP. I don't know if that counts as a penetration attack in your book, but it's not a simple DoS attack. TCP is not the only IP protocol that can be spoofed, just the hardest. (Well, not counting cyrptographically signed protocols :) ) Ryan
Current thread:
- IP Spoofing Scott, Richard (Oct 02)
- Re: IP Spoofing Ivan Arce (Oct 05)
- <Possible follow-ups>
- Re: IP Spoofing trall (Oct 04)
- Re: IP Spoofing Ryan Russell (Oct 04)
- RE: IP Spoofing Scott, Richard (Oct 05)