home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Freaks Macintosh Archive
/
Freaks Macintosh Archive.bin
/
Freaks Macintosh Archives
/
Hacking & Misc
/
HU HL IP Spoofing.sit
/
HU HL IP Spoofing
next >
Wrap
Text File
|
1998-07-06
|
1KB
|
38 lines
Spoofing Ip`s for HL server
Using Monolith's Free DNS or Dynamic Free DNS project to record your IP. Set up your own
mail server (EIMS) for contact between you and them, and use your name that you register with
them for the address of the mail server.
For Example:
My IP: 210.62.144.1
*True* name resolution: mymac.myisp.net
Your IP is probably smaller than Monolith.
So, if you register with monolith:
My IP: 210.62.144.1
My Desired Name: spoof.warez.dyn.ml.org
My contact email: admin@spoof.warez.dyn.ml.org
My contact name: admin
Now you have a secure account at Monolith, now when the spa surfs in, they will trie a
dns-resolve on your IP address.They only get this
nslookup> 210.62.144.1
nslookup_out> spoof.warez.dyn.ml.org
This “IS NOT SECURE” it can be beaten, but hopefully you will have time to disappear before
it is.
The only safer method involves IP FORWARDING is an IP FORWARDING scheme, one box
acts as an internet-firewall, echoing your address to something else, you must *have* both
addresses, but you may then be _safer_. Especially if both boxes are in *different* physical
locations.
Additionally, you can find out where the server v_1.2.1 stores its list of banned ip's, then you
can insert a list containing ip numbers that you don't want to connect (like *.gov, etc).
Good Luck
[From ??? ]