Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 17 Oct 2010 21:52:54 -0500
From:      CyberLeo Kitsana <cyberleo@cyberleo.net>
To:        Brandon Gooch <jamesbrandongooch@gmail.com>
Cc:        Robert Bonomi <bonomi@mail.r-bonomi.com>, freebsd-questions@freebsd.org, Nerius Landys <nlandys@gmail.com>
Subject:   Re: UDP packet spoofed LAN source address?
Message-ID:  <4CBBB686.6000100@cyberleo.net>
In-Reply-To: <AANLkTikv0kDRJ9RztQD-1GUuet1mtCMdr%2BWtHqtpzn4c@mail.gmail.com>
References:  <201010171718.o9HHISJq003050@mail.r-bonomi.com>	<AANLkTi=7wboDK=ZsRPwsA7ZZh-51-83cs5TCm6Yv%2BH8K@mail.gmail.com> <AANLkTikv0kDRJ9RztQD-1GUuet1mtCMdr%2BWtHqtpzn4c@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On 10/17/2010 06:37 PM, Brandon Gooch wrote:
> On Sun, Oct 17, 2010 at 4:59 PM, Nerius Landys <nlandys@gmail.com> wrote:
>>>
>>>
>>>> Maybe, is there a simple 10 line C program that I can run and compile to
>>>> check if this scenario is possible on _my_ server?
>>>
>>> 'netcat' has the capability built in.
>>>
>>>
>> root# echo "hi" | nc -u -w 1 -p 30002 -s 64.156.193.115 daffy 30001
>> nc: bind failed: Can't assign requested address
>>
>> I don't seem to be able to spoof a source address using netcat, unless I'm
>> missing something in the man page.
> 
> I think you need to have the IP address you wish to spoof bound to an interface.

Or use Nemesis as root.

[0] http://nemesis.sourceforge.net/

-- 
Fuzzy love,
-CyberLeo
Technical Administrator
CyberLeo.Net Webhosting
http://www.CyberLeo.Net
<CyberLeo@CyberLeo.Net>

Furry Peace! - http://wwww.fur.com/peace/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4CBBB686.6000100>