The MIT IP Packet Spoofing Project – Can We Spoof IP Packets?

Keep on Guard!

Now this is a VERY interesting project, as I’ve always said the majority of DoS attacks and DDoS attacks (90%+) could be stopped if all the ISP’s null routed packets which DO NOT originate from IP blocks they own, e.g. spoofed packets.

Basically the project has been established to see if you can spoof IP packets or not, and what percentage of ISPs already drop the packets.

It seems in general about 20-25% of systems are able to spoof packets.

Packet Pie Charts

The classic design tenets of Internet architecture produced a network capable of remarkable scalability while relegating security to the end hosts. As a result, the public Internet includes no explicit notion of authenticity and will forward packets with forged headers. Malicious users capitalize on the ability to spoof” source IP addresses for anonymity, indirection, targeted attacks and security circumvention. Compromised hosts on networks that permit IP spoofing enable a wide variety of attacks. Despite being first exploited over two-decades ago, IP spoofing is a persistent problem and a continued threat. In addition to mounting spoofed-source bandwidth-based denial-of-service (DoS) attacks, new exploits utilizing IP spoofing surface regularly.

You can read more of the intro to the ANA spoofing project here.

Some may suspect the project and the software involved is somewhat nefarious, but oh well, if you are going to get r00ted by someone, let it be MIT ok? Anyway you can always run it in a sandbox or in a fresh VMware machine.

If you don’t care either way, you can download the spoofer software here.

Please note though, it won’t run under Windows XP SP2, due to the whole raw sockets issue I would imagine.

The majority of systems tested so far have been Windows systems though (64%).

A summary of the results:

Total Completely Failed Spoof Attemps: 1823
Failed as a result of Windows XP SP2: 528
Failed as a result of (non-Windows) Operating System block: 111
Failed as a result of being Behind a NAT: 702

The various types of tests show which restrictions are in place.

Packet Summary Results

A full summary of the results are here.

Digg This Article

Posted in: Network Hacking

, , , , , , ,

Recent in Network Hacking:
- T50 – The Fastest Mixed Packet Injector Tool
- PenTools – Penetration Testing Tools Bundle
- EtherApe – Graphical Network Monitor

Related Posts:

Most Read in Network Hacking:
- Brutus Password Cracker – Download AET2 - 1,610,233 views
- Wep0ff – Wireless WEP Key Cracker Tool - 515,208 views
- THC-Hydra – The Fast and Flexible Network Login Hacking Tool - 331,146 views

One Response to The MIT IP Packet Spoofing Project – Can We Spoof IP Packets?

  1. Pushkar Bhatkoti March 10, 2007 at 8:56 am #

    nMAP IS a good tool. I hvae been using it for 4 yrs and it does prety much most of spoofing stuffs.
    Firewalls can be spoofed too!!