![]() Failure to do so could be illegal, possibly get you fired and maybe even bring systems down. You could use a Span or Mirrored port as Lucas points out or you could force the switch to begin forwarding packets to you in a variety of ways.īefore I continue with more of an answer for possibility #1 let me clearly state that what I am suggesting should be done only with permission and initially in a test environment. A known example for a DoS tool is the Low Orbit Ion Cannon (LOIC), (at least) formerly used by anonymous.If by remote you mean "on my local LAN but not me" then the answer is possibly If by remote you mean "on a remote LAN" then the answer is "No, not with Wireshark." You'd be looking for something like a network probe with RMON capabilities. DDoSing isn't that easy because your attack needs to be a little more sophisticated or may even require access to a botnet. The other way could be that if he interacts with you in any way directly, through chats, a game, whatever, he can looku p his own connection table ("netstat -an" on a command line) and find your IP in it.ĭoSing is quite easy, there's tons of tools for that. If you've got a static address, any post will do. Recent, because as a normal user your public IP will be changed every once in a while, coming from a DHCP pool of your provider. If the "bad guy" can gain access to the DB (or maybe he even runs it, which would be the easiest way for him) he can find your IP associated with a recent post you did. For example if you're posting something on a forum, that forum will usually record the IP you're connecting with in it's databases. To find your IP address the guy attacking it needs to see a connection to it, or get access to logs that show your IP.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |