Hopefully this is a hard enough question for the Highly Technical forum. If not please don?t flame me?. too much.
Here is the hypothetical situation:
Meet Bob and Sue. Both Bob and Sue work in the same complex with a large network (large company, campus, etc). Sue and Bob used to go out with each other and the breakup was not a nice one. One day Bob received several hundred dollars worth of stuff from vendors he typically buys from. Unfortunately, Bob did not order this merchandise and it was charged to his credit card. On investigation with the vendors they give him the IP address of a computer at work (work has all static IPs and centurion protection that resets computers after every reboot). Bob asks security to play the security tape of the machine that the IP was registered to. The tape shows Sue at the computer at the times of the purchases. However the back of the screen is away from the camera so you cannot see what she is doing on the computer. However, server logs on the proxy server confirm that the only IP address to visit any of the sites was the IP of Sue?s computer. Bob accuses Sue because she knew his credit card info as well as vendor logon information from when they were together. Sue says that Bob is setting her up by spoofing her IP address.
Now my question:
This is how I understand IP spoofing works. When a machine spoofs another IP the spoofing machine keeps its IP but when a server/website asks for identification instead of giving its true IP it gives it the fake one. And because of this, when some one tries to make a connection of some sort to the IP that is being spoofed, the connection will be make with the computer with the IP NOT the computer spoofing the IP.
Easier.
1. Can you spoof an IP on a network with a proxy server and will the proxy server log the IP of the spoof or the original IP of the machine when accessing websites?
Harder.
2. When a computer wants to order something from an online retailer it tries to make a connection in SSL. Now if your spoofing with the website with SSL isn?t the website trying to make a connection to the machine with the IP your spoofing and not that of the attacking machine? Or is what is Sue saying true, that Bob spoofed her IP and made the orders.
Dumb @$$ factor.
3. Or have I completely mistaken how IP spoofing takes place?
Thank you for your patients and please let me know what you think. Poor hypothetical Bob is going through hell.
Here is the hypothetical situation:
Meet Bob and Sue. Both Bob and Sue work in the same complex with a large network (large company, campus, etc). Sue and Bob used to go out with each other and the breakup was not a nice one. One day Bob received several hundred dollars worth of stuff from vendors he typically buys from. Unfortunately, Bob did not order this merchandise and it was charged to his credit card. On investigation with the vendors they give him the IP address of a computer at work (work has all static IPs and centurion protection that resets computers after every reboot). Bob asks security to play the security tape of the machine that the IP was registered to. The tape shows Sue at the computer at the times of the purchases. However the back of the screen is away from the camera so you cannot see what she is doing on the computer. However, server logs on the proxy server confirm that the only IP address to visit any of the sites was the IP of Sue?s computer. Bob accuses Sue because she knew his credit card info as well as vendor logon information from when they were together. Sue says that Bob is setting her up by spoofing her IP address.
Now my question:
This is how I understand IP spoofing works. When a machine spoofs another IP the spoofing machine keeps its IP but when a server/website asks for identification instead of giving its true IP it gives it the fake one. And because of this, when some one tries to make a connection of some sort to the IP that is being spoofed, the connection will be make with the computer with the IP NOT the computer spoofing the IP.
Easier.
1. Can you spoof an IP on a network with a proxy server and will the proxy server log the IP of the spoof or the original IP of the machine when accessing websites?
Harder.
2. When a computer wants to order something from an online retailer it tries to make a connection in SSL. Now if your spoofing with the website with SSL isn?t the website trying to make a connection to the machine with the IP your spoofing and not that of the attacking machine? Or is what is Sue saying true, that Bob spoofed her IP and made the orders.
Dumb @$$ factor.
3. Or have I completely mistaken how IP spoofing takes place?
Thank you for your patients and please let me know what you think. Poor hypothetical Bob is going through hell.