First page Back Continue Last page Overview Graphics
Attacker's Dilemma
Firewalls block addresses
Some firewalls allow some traffic in (business partners, trusted clients, etc)
VPNs may limit addresses that can access
Perimeter technologies log stuff (including our IP address)
Spoofing “dies” using TCP/IP
Advanced spoofing requires rewriting every app/tool from scratch
Notes: