hping wiki

Differences for page IP spoofing

Current version compared with version Mon Sep 05 15:29:46 GMT 2005

- In computer networking, the term Internet Protocol spoofing (IP spoofing) is the creation of IP packets with a forged (spoofed) source IP address. Actually the term is often used to define another (more complex) attack related to the [TCP] protocol, where a TCP connection is created using a spoofed IP address, guessing the [TCP] [ISN] (Initial Sequence Number) sent by the other peer in the TCP [SYN]/[ACK] packet sent as reply to the intial [TCP] [SYN] packet. Today IP-based authentication is (or at least should) not be used, but in the past this attack was used in order to gain reserved access where there was some IP-related trusted relationship. This attack is hard against modern and robust [TCP/IP] stack implementations that are designed in order to generate unguessable [ISN] numbers.+ In computer networking, the term Internet Protocol spoofing ([IP] spoofing) is the creation of [IP] packets with a forged (spoofed) source [IP] address. Actually the term is often used to define another (more complex) attack related to the [TCP] protocol, where a TCP connection is created using a spoofed [IP] address, guessing the [TCP] [ISN] (Initial Sequence Number) sent by the other peer in the TCP [SYN]/[ACK] packet sent as reply to the intial [TCP] [SYN] packet. Today [IP]-based authentication is (or at least should) not be used, but in the past this attack was used in order to gain reserved access where there was some IP-related trusted relationship. This attack is hard against modern and robust [TCP/IP] stack implementations that are designed in order to generate unguessable [ISN] numbers.

The following is the old page content