05 May 2006 | 17,120 views

The MIT IP Packet Spoofing Project – Can We Spoof IP Packets?

Check For Vulnerabilities with Acunetix

Now this is a VERY interesting project, as I’ve always said the majority of DoS attacks and DDoS attacks (90%+) could be stopped if all the ISP’s null routed packets which DO NOT originate from IP blocks they own, e.g. spoofed packets.

Basically the project has been established to see if you can spoof IP packets or not, and what percentage of ISPs already drop the packets.

It seems in general about 20-25% of systems are able to spoof packets.

Packet Pie Charts

The classic design tenets of Internet architecture produced a network capable of remarkable scalability while relegating security to the end hosts. As a result, the public Internet includes no explicit notion of authenticity and will forward packets with forged headers. Malicious users capitalize on the ability to spoof” source IP addresses for anonymity, indirection, targeted attacks and security circumvention. Compromised hosts on networks that permit IP spoofing enable a wide variety of attacks. Despite being first exploited over two-decades ago, IP spoofing is a persistent problem and a continued threat. In addition to mounting spoofed-source bandwidth-based denial-of-service (DoS) attacks, new exploits utilizing IP spoofing surface regularly.

You can read more of the intro to the ANA spoofing project here.

Some may suspect the project and the software involved is somewhat nefarious, but oh well, if you are going to get r00ted by someone, let it be MIT ok? Anyway you can always run it in a sandbox or in a fresh VMware machine.

If you don’t care either way, you can download the spoofer software here.

Please note though, it won’t run under Windows XP SP2, due to the whole raw sockets issue I would imagine.

The majority of systems tested so far have been Windows systems though (64%).

A summary of the results:

Total Completely Failed Spoof Attemps: 1823
Failed as a result of Windows XP SP2: 528
Failed as a result of (non-Windows) Operating System block: 111
Failed as a result of being Behind a NAT: 702

The various types of tests show which restrictions are in place.

Packet Summary Results

A full summary of the results are here.

Digg This Article



Recent in Network Hacking:
- IPFlood – Simple Firefox Add-on To Hide Your IP Address
- masscan – The Fastest TCP Port Scanner
- BurpSentintel – Vulnerability Scanning Plugin For Burp Proxy

Related Posts:
- Zodiac – DNS Protocol Monitoring and Spoofing Tool
- IE Address Bar Spoofing
- Caller ID Spoofing to be Made Illegal in the USA

Most Read in Network Hacking:
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,059,562 views
- Wep0ff – Wireless WEP Key Cracker Tool - 511,607 views
- THC-Hydra – The Fast and Flexible Network Login Hacking Tool - 314,310 views

Advertise on Darknet

One Response to “The MIT IP Packet Spoofing Project – Can We Spoof IP Packets?”

  1. Pushkar Bhatkoti 10 March 2007 at 8:56 am Permalink

    nMAP IS a good tool. I hvae been using it for 4 yrs and it does prety much most of spoofing stuffs.
    Firewalls can be spoofed too!!