Back to the Spoofit Page

Part II: Advanced spoofing (Blind)




0. Introduction
---------------


This is the sequel to 'A short overview of IP spoofing: PART I' that 
discussed Non Blind Spoofing. I actually wasn't planning on doing 'PART II' 
anymore. But the many mails I received asking for 'PART II' made me put it 
together anyway. 
I'm afraid it will disappoint you, but read it anyway, maybe you'll like
some of the source code...


0.1 What
--------


This document describes some IP spoofing attacks and it gives you example 
source code of the programs used on these attacks (and packet sniffer logs, so
you see what exactly happens).

If you have interesting remarks, comment, idea's, ... please contact me
	Brecht Claerhout <Coder@reptile.rug.ac.be>

If YOU think of yourself, you are "3XTr3/\/\3lY 3Le3T", please don't bother 
contacting me. 
Flames >/dev/null or >/dev/echo depends on how idiotic you are.

It is not wise to use what you don't know/understand, so read this before 
trying anything... it will only take a few minutes, and probably save you 
some hours of failure...

This code is not crippled in the usual way (removing some vital part), 
the power is limited by it's briefness, because I wanted to keep 
everything simple and illustrative (but working). It's a simple job to 
improve it, and that is the goal of this doc, that you improve it yourself.

Finally, I want to thank Fyodor <fyodor@dhp.com> for correcting most of my 
grammar and spelling errors, any errors left are fully my responsibility, not 
his.


0.2 For whom
------------


For people with a small knowledge of TCP/IP, some knowledge on C (only 
the basic setup) and a little general UNIX knowledge.
It's no use reading this document if you are completely unaware of these 
things, but mind you, only a little knowledge is enough.


0.3 Disclaimer
--------------


I am in no way responsible for the use of this program. By using this 
software and reading this document you accept the fact that any damage 
(emotional, physical, data loss, ...) caused by the use or storage of 
these programs/documents is not MY responsibility.

I state that during the writing and testing of this document/source, I 
never violated any law. All spoofing was done between machines where I had 
legit root access, or where I had the permission from the legit root.


0.4 License
-----------


All source code and text is freely available. You can spread it, as long 
as you don't charge for it (exceptions are a small reproduction fee, if 
it isn't spread together with commercial software, texts.)
You may not spread parts of the document, it should be spread as one 
package. You may not modify the text and/or source code. 

You can use the spoofit.h in your own programs as long as they are not 
commercial (i.e. FREE), and you give me the credits for it in your 
documentation (either separate docs, or included in source). In that case 
you can modify the spoofit_v3.h file, if it is mentioned.


Brecht Claerhout: coder@succeed.net