Gå til innhold
Trenger du hjelp med internett og nettverk? Still spørsmål her ×

Hva er IP Spoofing?


Anbefalte innlegg

Okay, jeg sjekket nylig loggen til routeren min i og med at jeg har problemer med nettet, og la merke til at denne biten stod der:

 

2007/02/12 22:13:11 ** IP Spoofing ** <IP/TCP> 192.168.1.29:80 ->> 193.216.214.xx:4296

2007/02/12 22:14:06 ** IP Spoofing ** <IP/TCP> 192.168.1.13:80 ->> 193.216.214.xx:4297

2007/02/12 22:14:15 ** IP Spoofing ** <IP/TCP> 192.168.1.29:80 ->> 193.216.214.xx:4296

2007/02/12 22:15:10 ** IP Spoofing ** <IP/TCP> 192.168.1.13:80 ->> 193.216.214.xx:4297

2007/02/12 22:15:19 ** IP Spoofing ** <IP/TCP> 192.168.1.29:80 ->> 193.216.214.xx:4296

 

Hva betyr IP Spoofing? Aldri lagt merke til noe slikt før :S

 

(Byttet ut siste biten av IP'en med xx, står ikke det i loggen :p)

Lenke til kommentar
Videoannonse
Annonse

# returning an IP address that is different from the one that is actually assigned to the destination website.

www.abelgraphics.co.uk/glossary.php

 

# is the illegal process of faking an IP address.

www.prowebster.com/G-K.htm

 

# IP-Spoofing is a complex technical attack that is made up of several components. It is a security exploit that works by tricking computers in a trust-relationship that you are someone that you really aren't. There is an extensive paper written by daemon9, route, and infinity in the Volume Seven, Issue Fourty-Eight issue of Phrack Magazine.

gul.ime.usp.br/Docs/docs/howto/other-formats/html/HOWTO-INDEX-html/Security-HOWTO-12.html

 

# In computer networking, the term Internet Protocol spoofing (IP spoofing) is the creation of IP packets with a forged (spoofed) source IP address.

en.wikipedia.org/wiki/IP_spoofing

 

--

 

tatt fra en google define:ip spoofing

Lenke til kommentar
# returning an IP address that is different from the one that is actually assigned to the destination website.

www.abelgraphics.co.uk/glossary.php

 

# is the illegal process of faking an IP address.

www.prowebster.com/G-K.htm

 

# IP-Spoofing is a complex technical attack that is made up of several components. It is a security exploit that works by tricking computers in a trust-relationship that you are someone that you really aren't. There is an extensive paper written by daemon9, route, and infinity in the Volume Seven, Issue Fourty-Eight issue of Phrack Magazine.

gul.ime.usp.br/Docs/docs/howto/other-formats/html/HOWTO-INDEX-html/Security-HOWTO-12.html

 

# In computer networking, the term Internet Protocol spoofing (IP spoofing) is the creation of IP packets with a forged (spoofed) source IP address.

en.wikipedia.org/wiki/IP_spoofing

 

--

 

tatt fra en google define:ip spoofing

7964483[/snapback]

Så, det er farlige greier? oO

 

Kan man finne ut hvem som gjør det? :S

Lenke til kommentar

Opprett en konto eller logg inn for å kommentere

Du må være et medlem for å kunne skrive en kommentar

Opprett konto

Det er enkelt å melde seg inn for å starte en ny konto!

Start en konto

Logg inn

Har du allerede en konto? Logg inn her.

Logg inn nå
  • Hvem er aktive   0 medlemmer

    • Ingen innloggede medlemmer aktive
×
×
  • Opprett ny...