Alice AUSTIN

Alice AUSTIN is studying Cisco Systems Engineering. He has passion with both hardware and software and writes articles and reviews for many IT websites.

29 thoughts on “Using Nmap: Spoofing an IP Address

  • @IMNODOCTOR"real hackers build their own tools and seldom use the tools of others"
    LOL shut the fuck up you clown skid, this is nmap! Every Infosec professional, sysadmin, and white/black-hat hacker should be using this. Nmap is like the swiss army knife of network tools you fucking moron stfu you dont deserve to lay hands on a keyboard.

  • it's actually very useful for network exploitation…

  • Yeah but you'll have to kick him out too cause he'll get your packets and you'll take his and you'll be forcing the router to reject each other's packets. In sniffing it's no big deal, you can sniff anything in a local network. The only way you can spoof a remote ip is to own/hack an isp server.

  • Thats wrong. Skiddies and noobs are our food. It's like being rich and saying "they should execute the poor". And who will you then exploit?

  • If u watched the movie X-MEN character MYSTIQUE where she would change appearances anytime she infiltrates the command center to look like the personal…..that's about the same when u change your IP to look like your victim's IP address, u can do a lot of things 🙂

  • They are saying that because changing your local area network ip really isn't very useful at all…

  • Good….it's funny lookin' at some people's comments saying for example : great u changed ur identity, so what. These people don't understand that spoofing, is the 1 step of attacking… 🙂

  • Lots on nonsense about concealing identities, hacking etc. Has it occurred to anyone over the age of 12 this could have legit use such as testing geolocation services? :/

  • @saolthedarkone FAIL VIDEO – DELETE IT ( I LOST MY 45sec with YOU )

  • real hackers build their own tools and seldom use the tools of others… you only taught others how to be a fool.

  • "man nmap"

    There, I saved you another random YouTube search for nmap documentation.

  • @saolthedarkone And this is why skiddies shouldn't be allowed to use the internet.

  • @MrSiebel actually your MAC is recognized by your router (if using one) and is used to share information between computers on your network. When you plug in your cpu to the router (or wireless connection) your computer gives its MAC to the router and any computer that wants to reach yours says "I'm trying to reach JOE at MAC address (hexadecimal)" and reply comes back with "IP is (32 bit address)"

  • @powerdbycomedy

    ahhahha that was a good one!!!!

  • @saolthedarkone Actually, it does do stuff. Say you are at a coffee shop, and you have to pay for the WiFi, there is already a person in the coffee shop who has paid for the WiFi and is on the net. You can spoof your internal IP and your MAC address and trick the router into believing you are him. Therefore, free WiFi at your local coffee shop…

  • @powerdbycomedy

    I agree with what your saying except you obviously have no idea how useful nmap is. With little more then a cmd prompt, nmap and telnet you can explore the universe. Only a fool would argue.

  • @powerdbycomedy

    all of your points are bullshit.
    + if you don't know what nmap is then you shouldn't even be making any comments.

  • @saolthedarkone gets you unbanned form games…

  • Lame just changed his internal IP you can do that without Nmap…
    ~

  • on linux go to a terminal and type apt-get nmap.
    For windows, functionality won't be the same but try to google for Zenmap.

  • yay in this 2 motnhs i also found it 🙂 it works just fine 🙂 thx

  • does any1 knows a small linux livecd with fluxbox,nmap and so on… like navynos … but all the links are down and DVL is too big 🙁

  • Now you do realize that you will NEVER get a response from your scanned host because you have no legitimate route back to your machine with just any ip out of thin air inserted in nmap. You must use an ARP poison on your local network end in your subnet as your ip to "spoof", only then will you have a true response able to be sent back to your machine because you will have a legitimate ip and route for the target to come respond to.

Comments are closed.