Ineed to send spoofed IGMP(not ICMP)
Packet.
Who knows how?
Posted on 2002-01-03 01:23:35 by NetGerty
You'll probably need to use raw sockets. Now give me a legitimate
reason to spoof IGMP packets...
Posted on 2002-01-03 01:45:34 by f0dder
I foresee this thread being closed.
Posted on 2002-01-03 03:06:26 by eet_1024
So do I ;) - but I'm giving him the benefit of doubt.
Posted on 2002-01-03 03:12:55 by f0dder
The Internet Group Message Protocol (IGMP) is exploitable because it reports error conditions at the user datagram level, and contains routing and network information.

The solution to preventing IP spoofing is securing transmission packets and establishing screening policies. Point-to-point encryption will prevent unauthorized users from reading the packets.

Authentication can prove that a legitimate source, and not a spoofed middleman, sent the contents of the packet. In either case, any attempt to tamper with the packets would leave some tell-tale sign to warn system admins.

Inotherwords, maybe he is a network systems admin (possibly testing his internal network strengths against this type of attack)? Or not :)

Sliver
Posted on 2002-01-03 03:24:38 by Sliver
I'm testing my nuke nabber program and i need to test it!
Posted on 2002-01-03 05:46:06 by NetGerty
If you made a "nuke nabber", you should already know enough to
send a spoofed packet, no? Get yourself a raw socket (2k/xp only),
and the IP RFCs.
Posted on 2002-01-03 11:26:17 by f0dder
there is no fool proof solution to prevent malicious use of ip spoofing really (in IPv4), like cracking :), but admins could make it harder to do. It's a flaw in IPv4. IPv6, makers claim, have gotten rid of spoofing, but it's not vastly implemented yet.


netgerty:

f0dder has a point.
Posted on 2002-01-04 16:30:08 by clip