نقل قول نوشته اصلی توسط NetworkFA نمایش پست ها
The CAIDA Spoofer project, building on the MIT ANA Spoofer project,
measures the Internet's susceptibility to spoofed source address IP
packets. Malicious users capitalize on the ability to "spoof"
source IP addresses for anonymity, indirection, targeted attacks and
security circumvention. Compromised hosts on networks that permit
IP spoofing enable a wide variety of attacks. New spoofing-based
attacks regularly appear (most recently against the DNS
infrastructure) despite decades of previous exploits and
prevention/tracing attempts.

The Spoofer client attempts to send a series of spoofed UDP packets
that test the ability to send different classes of spoofed traffic,
including private IP addresses (e.g. RFC1918), routable IP
addresses, and neighboring adjacent IP addresses. The tool also
estimates where along the path filtering is employed, and infers the
presence of a NAT device along the path.


این مورد رو توضیح بدید
عزیز چیزی که خودم براتون میفرستم رو به خودم پس ندین . اگر چیزی قرار بود پنهان بشه قطعا بی سرور صدا خودم این تستو میکردم

این مدل سرور به منظور مطالعات و تحقیقات دانشگاهی در زمینه spoof و چگونگی این روند هست در واقع میخوایم بفهمیم به چه دلایلی بر روی برخی ip ها این مورد باز میتونه باشه