spoofing

How to Spoof ip in java

浪尽此生 提交于 2019-11-28 07:59:53
问题 How to change tcp information in layer 3 in java ?(ip spoofing) how to change layer 2 information ? is there any good library for it in java ? it need raw socket? 回答1: JpCap may be what you want http://netresearch.ics.uci.edu/kfujii/Jpcap/doc/ 回答2: unfortunately to need access to the TCP/IP packet structures you need to work at very low level (you need the kernel headers in Linux for instance) so yes, you will definitely 100% need to do this outside java in a native library and call the code

Application Security Concerns: How easy is it to fake an IP-Address?

旧时模样 提交于 2019-11-28 04:32:42
问题 I am dealing with an application that is protected by a firewall and only allows access from certain IP-Addresses (which are application webservers). Its a bit delicate and it would be much hassle to introduce another authentication/protection layer. My understanding of networking is not great because its not my subject, but in my Head I made up the following scenario: Someone knows the IP-Address of one of our application servers and wants to fake it to get access to the other application

MIME Type spoofing

筅森魡賤 提交于 2019-11-27 16:11:24
问题 Checking for mime type in php is pretty easy but as far as I know mime can be spoofed. The attacker can upload a php script with for example jpeg mime type. One thing that comes to mind is to check the file extension of the uploaded file and make sure it matches the mime type. All of this is assuming the upload directory is browser accessible. Question: Are there any other techniques for preventing "bad files" from getting in with mime type spoofing? 回答1: Short answer: No. Longer answer:

How to detect the original MAC address after it has been spoofed?

為{幸葍}努か 提交于 2019-11-26 22:15:54
We are using the following code for retrieving active MAC address of a windows pc. private static string macId() { return identifier("Win32_NetworkAdapterConfiguration", "MACAddress", "IPEnabled"); } private static string identifier(string wmiClass, string wmiProperty, string wmiMustBeTrue) { string result = ""; System.Management.ManagementClass mc = new System.Management.ManagementClass(wmiClass); System.Management.ManagementObjectCollection moc = mc.GetInstances(); foreach (System.Management.ManagementObject mo in moc) { if (mo[wmiMustBeTrue].ToString() == "True") { //Only get the first one

What is the most reliable way to hide / spoof the referrer in JavaScript?

可紊 提交于 2019-11-26 21:33:09
Normally, the referrer is traceable through: JavaScript's document.referrer The request headers, e.g. PHP's $_SERVER['HTTP_REFERER'] I have set up a Codepad demo which shows these properties, for testing purposes. Requirements: The original referrer should effectively be hidden, at least for all mouse events. Cross-browser support (at least Chrome and Firefox). Stand-alone, without any external content (plugins, libraries, redirection pages, ...). No side-effects: Links should not be rewritten, history entries should be preserved . The solution will be used to hide the referrer when following

IP address spoofing using SharpPcap on C#

▼魔方 西西 提交于 2019-11-26 21:04:49
问题 I will use SharpPcap framework to make my spoofing program, so I need to edit my machine's IP address of the packet with another IP address on the source address field. I found some example on SharpPcap project, but how can I edit or change the source address field of sending packet? Here is the sample code for sending random packets: byte[] bytes = GetRandomPacket(); private static byte[] GetRandomPacket() { byte[] packet = new byte[200]; Random rand = new Random(); rand.NextBytes( packet );

What is the most reliable way to hide / spoof the referrer in JavaScript?

独自空忆成欢 提交于 2019-11-26 09:06:22
问题 Normally, the referrer is traceable through: JavaScript\'s document.referrer The request headers, e.g. PHP\'s $_SERVER[\'HTTP_REFERER\'] I have set up a Codepad demo which shows these properties, for testing purposes. Requirements: The original referrer should effectively be hidden, at least for all mouse events. Cross-browser support (at least Chrome and Firefox). Stand-alone, without any external content (plugins, libraries, redirection pages, ...). No side-effects: Links should not be

How to detect the original MAC address after it has been spoofed?

二次信任 提交于 2019-11-26 08:15:44
问题 We are using the following code for retrieving active MAC address of a windows pc. private static string macId() { return identifier(\"Win32_NetworkAdapterConfiguration\", \"MACAddress\", \"IPEnabled\"); } private static string identifier(string wmiClass, string wmiProperty, string wmiMustBeTrue) { string result = \"\"; System.Management.ManagementClass mc = new System.Management.ManagementClass(wmiClass); System.Management.ManagementObjectCollection moc = mc.GetInstances(); foreach (System