Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 13 Aug 1998 09:42:52 -0700 (PDT)
From:      "Jan B. Koum " <jkb@best.com>
To:        Matthew Hunt <mph@pobox.com>
Cc:        Marius Bendiksen <Marius.Bendiksen@scancall.no>, Brett Glass <brett@lariat.org>, freebsd-security@FreeBSD.ORG
Subject:   Re: UDP port 31337
Message-ID:  <Pine.BSF.3.96.980813094153.3896A-100000@shell6.ba.best.com>
In-Reply-To: <19980812224614.B8987@astro.psu.edu>

next in thread | previous in thread | raw e-mail | index | archive | help


	Uhm.. duh.
	Of course you can spoof port scan, but the point of the port scan
is to know what port are open. There are many other ways to get someone in
trouble.
	Now this thread is officially dead. :)

-- Yan

www.best.com/~jkb/         Unix users of the world unite:
www.{free,open,net}bsd.org | www.linux.org | www.apache.org | www.perl.com
"Turn up the lights, I don't want to go home in the dark."

On Wed, 12 Aug 1998, Matthew Hunt wrote:

>On Wed, Aug 12, 1998 at 02:55:59PM -0700, Jan B. Koum  wrote:
>
>> 	AFAIK IP spoofing is "blind" - you can't be doing spoofing IP
>> during a portscan. Hence, if someone to portscan class B for udp port
>> 31337, the ought to do it from the real IP. Now the fact that this IP
>> might belong to someone else (cracked account, etc) is another matter.
>
>At least one (quite effective) port scanner supports IP spoofing.
>True, the user doesn't get the results.  The purpose is to get
>somebody else in trouble for port scanning.
>
>-- 
>Matthew Hunt <mph@pobox.com> * Inertia is a property of matter.
>http://www.pobox.com/~mph/pgp.key for PGP public key 0x67203349.
>
>To Unsubscribe: send mail to majordomo@FreeBSD.org
>with "unsubscribe security" in the body of the message
>


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.980813094153.3896A-100000>