Date: Sun, 17 Oct 2010 21:52:54 -0500 From: CyberLeo Kitsana <cyberleo@cyberleo.net> To: Brandon Gooch <jamesbrandongooch@gmail.com> Cc: Robert Bonomi <bonomi@mail.r-bonomi.com>, freebsd-questions@freebsd.org, Nerius Landys <nlandys@gmail.com> Subject: Re: UDP packet spoofed LAN source address? Message-ID: <4CBBB686.6000100@cyberleo.net> In-Reply-To: <AANLkTikv0kDRJ9RztQD-1GUuet1mtCMdr%2BWtHqtpzn4c@mail.gmail.com> References: <201010171718.o9HHISJq003050@mail.r-bonomi.com> <AANLkTi=7wboDK=ZsRPwsA7ZZh-51-83cs5TCm6Yv%2BH8K@mail.gmail.com> <AANLkTikv0kDRJ9RztQD-1GUuet1mtCMdr%2BWtHqtpzn4c@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On 10/17/2010 06:37 PM, Brandon Gooch wrote: > On Sun, Oct 17, 2010 at 4:59 PM, Nerius Landys <nlandys@gmail.com> wrote: >>> >>> >>>> Maybe, is there a simple 10 line C program that I can run and compile to >>>> check if this scenario is possible on _my_ server? >>> >>> 'netcat' has the capability built in. >>> >>> >> root# echo "hi" | nc -u -w 1 -p 30002 -s 64.156.193.115 daffy 30001 >> nc: bind failed: Can't assign requested address >> >> I don't seem to be able to spoof a source address using netcat, unless I'm >> missing something in the man page. > > I think you need to have the IP address you wish to spoof bound to an interface. Or use Nemesis as root. [0] http://nemesis.sourceforge.net/ -- Fuzzy love, -CyberLeo Technical Administrator CyberLeo.Net Webhosting http://www.CyberLeo.Net <CyberLeo@CyberLeo.Net> Furry Peace! - http://wwww.fur.com/peace/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4CBBB686.6000100>