ip scanner? i dont think so!!,
you dont have any idea what you are talking about!what's with this anyway? that app seems nothing to do with *spoofing..
topic is all about spoofing, most common is DNS, IP and email spoofing.
ip scanner? i dont think so!!,
you dont have any idea what you are talking about!what's with this anyway? that app seems nothing to do with *spoofing..
topic is all about spoofing, most common is DNS, IP and email spoofing.
wahahaha. wtf. that sh1t is a toy for skiddies. has nothing to do with the real world for *spoofing. :P
hehehe.. bro.. likayi jud ang magpa techy2x diri kay daghan kamao diri.
naa sab bugal-bugalon.. basig bugal-bugalon raka.
this kind of software is just like an IP Scanner etc... this is not spoofing.
Spoofing is somewhat like imo i-impersonate ka usa ka identity like IP...
and you need to be adept with TCP/IP.
lisud man gud nang mag-spoof kunuhay ka pero ni gamit ka ug software na imo di-nownload sa internet..
ang resulta ana, ikaw possibly ma spoof sa ga-create ana nga program.
Payong kaibigan lang:
Always remember... there is no such thing as FREE software sa internet
Hope this helps
1. this program is used to scan the ip and physical address of other PCs.
2. after that iya gamiton sa iya own pc ang ip and mac address.
3. it will impersonate another machine sa network meaning spoof. sakto?
Spoofing
On the Internet, "to spoof" can mean one or more of the following:
1. To deceive for the purpose of gaining access to someone else's resources (for example, to fake an
Internet address).
2. To simulate a communications protocol by a program that is interjected into a normal sequence of
processes for the purpose of adding some useful function.
3. To playfully satirize a Web site.
SAK2 ka brad... dili man sila kahibaw mo tan-aw sa topic gud... basta spoofing... unsa virus? hahaha ako sad diay.. heheheheOriginally Posted by 13thProphet
try arp spoofing... im sure ur gonna get a lot of yahoo, friendster, online banking accounts.. basta dli manage ang switch...
an overview...
a typical scenario on how our traffic to the internet looks like on the network below:
victim --> switch --> router --> Internet (yahoo, friendster, online banking, etc..) vice versa
Below is a scenario when an attacker fires a man-in-the-middle attack using Arp spoofing or poisoning.
victim-->switch-->attacker-->router-->Internet
Internet-->router-->attacker-->switch-->victim
What happens is that the victim thinks that the attacker is the router but it is because the arp entries on the victim where already poisoned by the attacker... thus leading your packets to pass by the attacker first before going back and forth to the internet making him able to read all your unsecured data, credentials, etc. on the fly....
i cant feed you the tool to use... but to narrow down the search... browse www.insecure.org ... you'll find the tools that you would need there...
enjoy...
		Similar Threads | 
  |