spoofing

Session spoofing (PHP)

梦想与她 提交于 2019-12-01 03:39:19
I am coding a website in PHP that contains the boolean $_SESSION['logged_in'] . This is set to true when a username and password match are present in the database. I am quite new to sessions and was just wondering if it could be possible for an unregistered (or, for that matter, registered) user to bypass the login process by setting this boolean to true , as would be possible with a cookie. I understand that the user would have to manipulate a server-side variable from the client-side, but my questions are how easy would this be, how would the user go about accomplishing such a task, are

Preventing cURL Referrer spoofing

狂风中的少年 提交于 2019-12-01 02:22:37
We received PHP code from a developer with a web-stats script that relies solely on $_SERVER['HTTP_REFERER'] . With cURL, you can easily fake it as follows: curl_setopt($curl, CURLOPT_REFERER, "client website"); and I'm looking for a way to prevent it. This can even be done by the client website as well, to have higher stats. I'm looking for a way to prevent this spoofing. Is this possible at all? If so, how can this be achieved? No, there's no definitive way of determing the URL Referrer. As per the HTTP spec , HTTP_REFERER is optional. Some firewall packages strip these out by default, some

Send Raw IP packet in C#, everything above the ethernet layer

 ̄綄美尐妖づ 提交于 2019-12-01 02:18:02
问题 I don't want to modify the ethernet portions of the frame, but I need to modify the IP packet and the data portion of the frame. I try sending a raw frame and it still puts in the IP information. I basically need to send a frame without defining the endpoint except in the bits I'm sending. Here's what I got: Socket s = new Socket(AddressFamily.Unspecified, SocketType.Raw, ProtocolType.Raw); EndPoint ep = new IPEndPoint(IPAddress.Parse("205.188.100.58"),80); s.SendTo(GetBytes(""),ep); //im

Session spoofing (PHP)

孤人 提交于 2019-11-30 23:42:53
问题 I am coding a website in PHP that contains the boolean $_SESSION['logged_in'] . This is set to true when a username and password match are present in the database. I am quite new to sessions and was just wondering if it could be possible for an unregistered (or, for that matter, registered) user to bypass the login process by setting this boolean to true , as would be possible with a cookie. I understand that the user would have to manipulate a server-side variable from the client-side, but

How does Google Analytics prevent traffic spoofing

ε祈祈猫儿з 提交于 2019-11-30 11:30:19
问题 We want to embed an ajax style service into a number of our websites each with a unique api key. The problem that I can see is that because the api key is stored in the javascript file the user could potentially take the key, spoof the http referrer, and make millions of requests to the api under that api key. So I am wondering how Google prevents Analytics spoofing? As this uses almost the same idea. I'm also open to other ideas, essentially here is the process. SiteA -> User <-> Ajax <->

DHCP Server to Redirect any url to landing page

主宰稳场 提交于 2019-11-30 10:32:37
I have a linux DHCP server which I need to redirect all web traffic to a landing page which will have instructions on how to register their computer on the network. No matter what URL a user types in, the user needs to be redirected to a webpage (on the DHCP server). ie: user types google.com they are immediately redirected to 192.168.10.1. This DHCP server will never be used to access the web. Once the user acquires the instructions to register their computer from the landing page, they will be blacklisted on this particular DHCP server and forced to request an IP from the main DHCP server.

DHCP Server to Redirect any url to landing page

吃可爱长大的小学妹 提交于 2019-11-29 15:48:40
问题 I have a linux DHCP server which I need to redirect all web traffic to a landing page which will have instructions on how to register their computer on the network. No matter what URL a user types in, the user needs to be redirected to a webpage (on the DHCP server). ie: user types google.com they are immediately redirected to 192.168.10.1. This DHCP server will never be used to access the web. Once the user acquires the instructions to register their computer from the landing page, they will

How do you spoof HTTP_REFERER?

我的未来我决定 提交于 2019-11-29 14:31:19
I need to try and spoof the HTTP_REFERER passed my another page so that in the destination page, I can determine of the request is coming in from the "right" page and perform appropriate logic. How do I do that in JavaScript (AJAX)? Can I do that in ASP.Net? TIA rams Generally speaking, you cannot cause other browsers to return a false HTTP_REFERER without an exploit, plug-in, or other extension. If you want to modify the value sent from your web browser and you are using FireFox, look at the Modify Headers extension. In any case, you should never rely on HTTP_REFERER being accurate. There is

How to Spoof ip in java

最后都变了- 提交于 2019-11-29 14:09:22
How to change tcp information in layer 3 in java ?(ip spoofing) how to change layer 2 information ? is there any good library for it in java ? it need raw socket? JpCap may be what you want http://netresearch.ics.uci.edu/kfujii/Jpcap/doc/ unfortunately to need access to the TCP/IP packet structures you need to work at very low level (you need the kernel headers in Linux for instance) so yes, you will definitely 100% need to do this outside java in a native library and call the code in your Java app. 来源: https://stackoverflow.com/questions/6204967/how-to-spoof-ip-in-java

Application Security Concerns: How easy is it to fake an IP-Address?

久未见 提交于 2019-11-29 11:23:55
I am dealing with an application that is protected by a firewall and only allows access from certain IP-Addresses (which are application webservers). Its a bit delicate and it would be much hassle to introduce another authentication/protection layer. My understanding of networking is not great because its not my subject, but in my Head I made up the following scenario: Someone knows the IP-Address of one of our application servers and wants to fake it to get access to the other application which he knows the listening socket and protocol of. So he alters the Header of his IP packets to have