Categories Don Parker Blog

Spoofing one's IP address

It never fails that someone asks how they can spoof their IP address as they want to make sure they are totally anonymous on the Internet. Well fallacy number one is that you have any privacy at all on the Internet, and secondly that spoofing a TCP/IP connection is really rather limited in scope. Basic TCP/IP principles dictate that to complete the three way TCP/IP handshake then the orginator of the connection must be there to receive the returning stimulus ie: SYN/ACK. If you are spoofing someone's IP address then guess who is going to get the SYN/ACK? It will be them, and not you. I also had the same vision of what IP spoofing was all about until I stopped wasting my time with such idea's and started studying networking principles.

Don Parker

Published by
Don Parker

Recent Posts

Azure Windows Virtual Desktop: Avoid the fresh hell of stale user sessions

This tutorial on Azure Windows Virtual Desktop and stale users can help you cut down…

7 mins ago

Phishing campaign spoofs domain, targets computer vendors

A convincing-looking phishing campaign purportedly from a Texas government agency is targeting computer vendors in…

4 hours ago

Top 5 cybersecurity innovations and why they’re drawing in the money

With attackers making use of every vulnerability, our sense of security has turned into insecurity.…

7 hours ago

Have you really tested your disaster recovery plan?

How do you simulate a disaster to see whether your disaster recovery plan is ready…

1 day ago

Using conditions in ARM templates when deploying infrastructure-as-code

This Quick Tip shows you a neat little coding trick that will help you when…

1 day ago

Full circle: On-premises Exchange to Microsoft 365 — and back again

Migration from on-premises Exchange to Microsoft 365 may not be a one-way street. What about…

1 day ago