IP Address Cloning

Soldato
Joined
3 Jan 2009
Posts
8,037
I'm after some information on cloning an IP address (how susceptible your average wifi network is to this threat, how to protect against it, the ease at which it can be done, is cloning the same as spoofing, that sort of thing). Any info appreciated, or just a nudge in the right direction. Thanks.
 
Are you thinking of ARP spoofing?

Use a VPN to encapsulate all of your traffic if you're on public WiFi.
 
You wont be able to do that, the best you can do is arp spoof a hotspot and convince everyone else on the network that you are the default gateway so you can log data and pass it to the actual default gateway. Now MAC spoofing (your hardware address) is something completely different and possible but has pretty limited uses.
 
You wont be able to do that, the best you can do is arp spoof a hotspot and convince everyone else on the network that you are the default gateway so you can log data and pass it to the actual default gateway. Now MAC spoofing (your hardware address) is something completely different and possible but has pretty limited uses.

you see all the data on a wireless network anyway? surely its a case

1) run a network sniffing / encryption breaking prog
2) connect to the network
3) look at what data is being sent round?

no one else on the network needs to know you are there you will see all their traffic?
 
No problem, I've heard the term "IP cloning" used a few times and wanted to find out a bit more about it.

You can clone/spoof an IP if and only if you are communicating purely one way.

That is, you can send packets from an IP address of your choosing so long as you don't expect a response. This lack of a response means TCP connections are not possible, but firing off UDP packets from someone else's IP is completely possible.
 
Ignore someone using the term. They're probably talking out of their arse. :P

Yer, should also add even if you do spoof an address for one way communication there's no guarantee it will arrive because many ISPs will catch the 'strange' source address and block the packet. So really it's a bit of a no go unless you have near-perfect network conditions.
 
Back
Top Bottom