Well, the IP checks out, though an expert faker could fudge that.
Please forgive my ignorance, but HOW exactly?
IP spoofing can be used in a trusted relatioship exploit, but this is performed blind - TCP uses the IP of the received packet to direct the response. The spoofer does not get to see the responses, and works without them... Fine for hacking, but less useful for registering with, and conversing on a web site over http, I'd have thought...
1149 comments
Please forgive my ignorance, but HOW exactly?
IP spoofing can be used in a trusted relatioship exploit, but this is performed blind - TCP uses the IP of the received packet to direct the response. The spoofer does not get to see the responses, and works without them... Fine for hacking, but less useful for registering with, and conversing on a web site over http, I'd have thought...
Maybe there's something I'm, missing.