To: Cheeky Kid who wrote (3912 ) 12/24/1998 8:15:00 AM From: Green Receipt Respond to of 32883
I saw the source code to teardrop many months ago... I wrote my own ip spoofer as an exercise (months ago) but never did anything with it. Yeah they are out there. Hackers are always out there trying to test the limits of their reaches. teardrop performs the crash by 'mucking' the tcp/ip stack (all programs use a stack whether they know it or not). Compilers generate stacks for example when a function call is made, we (as a compiler) push the return address on the stack, push the parameters on the stack, maybe a parm count onto the stack and then we call the function. the function, reads the parm count, and pops the # of parms off the stack and then does its thing. at the end of the function, the return address is pop'd off, and then that address is called. Programmers also set up stacks as a temporary place to store information. the Tcp/ip stack is similar. yeah if someone knows your ip address they can pretty much do whatever they want to you. If you are on a LAN (non dialup to the internet, your ip address probably won't ever change, so yeah that would have potential problems. But if SI only posted a partial IP like the last 2 numbers, that might prove to be a workaround. Someone wanting to mess your terminal would have to try 255*2 combinations (hope I got that right). Of course, if you want to spoof your ip, you should try an address of 127.0.0.1 <-- anyone who attempts to attack that address, well they attack themselves. that ip is a h/w loop back address. If someone asks for your IP and you don't like them, just say 127.0.0.1 (however with the lawsuit happy folks in the mix, I would probably just say nothing, but at the same time if the person trashed their own computer, well they would kind of deserve it. David