in a nutshell, this step is just part of exploiting a trust relationship between two boxen (aka computers) that are on the net or simply communicating via a tcp based connection. what it does is fake out the other boxes on the network so they think that you're someone you're not.

i would go into further detail on this, but i'd take up too much space and probably get yelled at.

so if ya wanna find out more about it, you can go here:
you can also check out the spoofing node.

ps. don't go and do something stupid. the purpose of these magazines are too inform you what can be done, so you can protect against it. in short, if you go and hack someones network, and end up branded, shot, arrested, court-martialed, drawn and quartered, drawn and halved, or run off by wild horse then it's not my fault. other than that, have fun!!

pps. it's highly unlikely that this will be accomplished from a box running windows, period.

Log in or register to write something here or to contact authors.