IP Address Spoofing To Perform Bogus Form Submissions

Hello group..

We have been under sustained bogus form enquiry submission attack from a clickfarm. They were originally using VPNs. We contacted the VPN companies and they have blocked access to our websites across their platforms.

The culprits have now changed strategy and seem to be accessing the site using white listed IPs in the UK (Virgin, BT, Talk Talk etc)..

We can only presume they are now spoofing IP addresses?

Are we correct in this assumption?

If so, how do we now combat this one? Also note the lead data used in the form sill is passing Google recaptcha, honeytrap and data validation checks.

Any assistance is greatly appreciated.

Thanks

πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/lollypops007
πŸ“…︎ Feb 18 2021
🚨︎ report
Need help spoofing IP addresses closer to me

I’m trying to Spoof an IP close to my location, far but around my general state, is it possible to use Tails to spoof my IP to a city near me, rather than internationally?

πŸ‘︎ 4
πŸ’¬︎
πŸ‘€︎ u/Neekkzz
πŸ“…︎ Jul 06 2021
🚨︎ report
Quick question on IP address when spoofing

Hello everyone,

So I've been spoofing for quite a long time with no issues. I always stayed in my province and it was working flawlessly. However 6 months ago I spoofed in New York Central Park after I was offline for 24+ hours and yet, after spinning a pokestop I seemed to have been temp banned. Couldn't see any pokemon and spins wouldn't work. It got me thinking since I was on my wifi, Niantic can know where I live by the IP address. Do I need to VPN locally where I want to spoof to prevent detection ? Any other reasons or was I just panicking for nothing ?

I'm asking now because I'm tired of having no one in the local raids and looking to spoof further to popular spots.

By the way I only use GPS joystick + mock location. Yes it works 100% on my old phone.

Thanks,

πŸ‘︎ 8
πŸ’¬︎
πŸ‘€︎ u/pogo-random-01
πŸ“…︎ Jan 20 2019
🚨︎ report
Changing/Spoofing my IP address + MAC address on virtualbox (Windows 7 Ultimate)

Hello people,

This post was originally made on r/virtualmachine but due to the collective knowledge that this forum has I thought it would be appropriate to post on here aswell for more input/reference by other users.

In my case I am running hosting my VM on a Windows 10 desktop and my goals are as follows :

  1. Not reveal that I am using a VM

  2. Not reveal any data of my host machine

  3. Hide my IP address (would I install a VPN on my host machine or my VM)

  4. Spoof my MAC address

I am inexperienced with the intricacies and workings of VMware so I apologise if I have fucked up terminology/don’t understand how VM properly operates. I would also appreciate any information related to the subject of untraceability/anonymity while using a VM.

EDIT: Format correction

πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/liljjl
πŸ“…︎ May 03 2019
🚨︎ report
Do you think an IP address traced to a router is good enough evidence for a search warrant in this case? Could an IP address not be dynamic or be spoofed? bbc.co.uk/news/technology…
πŸ‘︎ 278
πŸ’¬︎
πŸ“…︎ May 23 2021
🚨︎ report
IP source address spoofing protection logs?

I'm fairly new to Cisco Meraki, I'm impressed by what I have seen so far :) I have a question - Under Firewall settings IP Source Address Spoofing Protection can be set to Block or Log. I cannot find where in the event log spoofing attempts would be logged. The documentation doesn't seem clear on this... Does anyone know what I can filter by to find this type of event? At the moment I have this set to "Block" all of networks I manage. Thanks!

πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/Schrolov
πŸ“…︎ Dec 09 2018
🚨︎ report
Creepshow Art claims stalker "Amy" spoofed her IP address after being accused of doxxing reddit.com/gallery/ntryto
πŸ‘︎ 134
πŸ’¬︎
πŸ‘€︎ u/thunderplump
πŸ“…︎ Jun 06 2021
🚨︎ report
IP Spoofing attacks with reply-to address

Sanity check, I'm hearing a few things that aren't adding up...

Do TCP and IP packets have a way to maliciously craft the header to have a different reply-to address than the source?

For example:
ACL that denies everyone but 1.1.1.1/28 to 53

If an attacker/bot throws the entire spoofed range of IP's at my firewall and hit the magic numbers - source 1.1.1.1 and reply to 2.2.2.2.

I see how a reflection attack would take spoofed source to DDoS someone else, but the team is talking data exfiltration.

I assume most packet integrity checks and L7/DPI/IPS would reject things like this, but in the realm of almost anything is possible, is this kind of attack viable/practical/or just known to violate the IP spec and firewall kills the session.

πŸ‘︎ 6
πŸ’¬︎
πŸ‘€︎ u/techtornado
πŸ“…︎ Mar 26 2018
🚨︎ report
Using a dead IP address and IP spoofing for UDP hole punching... Would this work?

Hello /r/networking.

I am developing a DHT in the Rust programming language, and as part of that effort I've been looking at how UDP hole punching works, since I need to make sure I support NAT traversal. The DHT consists of a series of nodes that should be able to contact each other via unsolicited UDP messages.

Ideally, I would like my network to be fully distributed, which would mean not depending on a rendezvous server as an initial point of contact between two nodes.

I would really like my nodes to be able to contact any other node in the network, regardless of NAT, without the aid of a central element. Now, I think I've come up with a solution, but I'm not a networking expert so what I'm about to propose may be completely stupid. Do not be afraid to tell me if that's the case. It's probably unfeasible, because otherwise someone must've thought of it before, but I'd love if you could tell me why, if that's the case, and whether or not there are any alternatives.

So... Let's say that I own a static IP address, but it's not associated to any live server. Any UDP packet sent to that address gets lost in the void. However, if I understand NAT correctly, the router must create an address tuple nevertheless, so if a UDP packet were to magically come back from that address, it would be routed to the appropriate host in the private network.

What if I make it so every one of the nodes on the network is sending a keepalive UDP packet to that 'black hole' address, all the time, and every time a node wants to handshake with another, the first packet is IP-spoofed to appear from that same IP?

If node A spoofs its ip to the 'black hole' address to contact node B, the packet will be accepted, containing the real IP and port of node A within it. From there on, both nodes can write to each other and the communication would be established. (obviously, node A would ping with the spoofed IP and its actual IP in parallel, so the router can translate both).

Am I missing something obvious? Are there any technical or legal reasons why ISPs wouldn't route my packets in this scenario?

Thanks!

πŸ‘︎ 16
πŸ’¬︎
πŸ‘€︎ u/Steel_Neuron
πŸ“…︎ Sep 29 2016
🚨︎ report
"Eventually when Tor addresses got banned, they began impersonating normal users - basically spoofing your IP address, your neighbor's IP address, your mom's IP address - by infecting computers with malicious software. A lot of people who had nothing to do with it are going to be implicated"

From the recent 'Fappening'.

How is this even possible? I thought IP addresses were unique?

πŸ‘︎ 47
πŸ’¬︎
πŸ‘€︎ u/PebbleBeach12
πŸ“…︎ Sep 01 2014
🚨︎ report
Spoofing an IP Address security.howellsonline.ca…
πŸ‘︎ 8
πŸ’¬︎
πŸ‘€︎ u/SecurityEng
πŸ“…︎ Jul 24 2014
🚨︎ report
When I connect through a certain VPN node will the public IP address always remain the same? I've used multiple nodes already and need more different IP addresses. Is there anyway I can go about getting new IP addresses when I connect to the same node through MAC address spoofing or something?
πŸ‘︎ 5
πŸ’¬︎
πŸ‘€︎ u/mxpridm
πŸ“…︎ Nov 27 2016
🚨︎ report
Talk about low effort...*Mobile provider and just an IP instead of a spoofed web address...
πŸ‘︎ 525
πŸ’¬︎
πŸ‘€︎ u/WTP07
πŸ“…︎ Jan 31 2021
🚨︎ report
[HUGE SECURITY ISSUE] Players spoofing their name to "ADMIN" is still a thing it seems, this one was doxxing potential IP addresses of random players in the server during a match - please spread awareness to DICE
πŸ‘︎ 569
πŸ’¬︎
πŸ‘€︎ u/Vastiny
πŸ“…︎ Oct 18 2019
🚨︎ report
Can we stop IP address spoofing to reduce DDoS attacks? A new whitepaper explores the issues circleid.com/posts/201509…
πŸ‘︎ 4
πŸ’¬︎
πŸ‘€︎ u/danyork
πŸ“…︎ Sep 11 2015
🚨︎ report
Is it possible to spoof* your ip address to localhost?

A while back when i thought surfing deep web was cool and stuff i came across a lot of boards some of which were not as popular and very clean but had few rotten apples, i remember one moderator being so angry that someone was posting illegal content that we're not allowed to talk about and him being impossible to track because his ip address was literally localhost. How is this possible? Or, is it even possible?

    • i don't know how to call it so I'm calling it spoofing.
πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/GeorgeBoca
πŸ“…︎ May 13 2021
🚨︎ report
SPF record IP spoofing

I am learning about SPF. One thing I never hear mentioned with ways to bypass SPF is by IP address spoofing. Couldn’t an attacker lookup the SPF records for a particular domain and spoof their address as such? I understand that they wouldn’t get any actual response, but that could get their email through a filter where somebody may click on a link. Also, I understand this would only work if the ISP of the attacker doesn’t do IP validation on source addresses.

πŸ‘︎ 7
πŸ’¬︎
πŸ‘€︎ u/Hoffman9134
πŸ“…︎ Jan 24 2022
🚨︎ report
Multiple vulnerabilities in Microsoft Teams could spoof URLs, leak IP addresses
πŸ‘︎ 11
πŸ’¬︎
πŸ‘€︎ u/Mac_Hertz
πŸ“…︎ Dec 22 2021
🚨︎ report
Did NASA's IP address get spoofed?
πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/mclionhead
πŸ“…︎ Apr 16 2021
🚨︎ report
New AWS attack technique - Attackers can spoof their IP address on CloudTrail logs hunters.ai/blog/hunters-r…
πŸ‘︎ 5
πŸ’¬︎
πŸ‘€︎ u/Sayag_Security
πŸ“…︎ May 30 2021
🚨︎ report
New AWS attack technique - Attackers can spoof their IP address on CloudTrail logs

Hello everyone!

I'm a security researcher from Hunters (XDR company).

We found an interesting new attack technique.

We found a way to obfuscate the attacker IP on AWS Cloud Trail logs. It means that when attackers compromise an account, they will be able to choose the IP address that is logged to the account, using the VPC feature.

You can read more about it here (our blog) and listen to our new podcast about it here.

My Twitter account: u/sayag_security

What do you guys think?

πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/Sayag_Security
πŸ“…︎ May 30 2021
🚨︎ report
MAC Address spoofing help

Quick Background:

I have spectrum community wifi because I live in an apartment. Great speed but no ability to customize the network (personal routers/access points, switches, NAS, etc. Basically anything fun gets blacklisted). I lost access to my smart lights because spectrum sees my Hue Bridge as a "router". This is a known issue and spectrum support basically says "tough shit". I have no access to any network equipment past the ethernet port in the wall. I have no other options without paying an insane amount for sub par internet.

Theory:

One of my classmates at college mentioned that an old roommate of his spoofed the MAC of a printer on the school's dormatory network and it allowed him to use his personal router. He used a ras pi between his router and the wall. Not sure on the exact details. My theory is that if I do a similar thing I could fool the network into allowing my personal router to work properly.

The question:

I have a netgear r6080 that has the ability to "use this mac address". I've tried setting the mac as that of my printer on a separate network (at my childhood home) but I'm receiving an error "403 forbidden" when I hit apply.

Why is the setting not taking? Assuming I could get the router feature to work, would this be a viable solution? Would the router retain the setting once I install it at my apartment? Again, I have no access to the modem to power cycle it so everything has to be done offline or at my other residence.

Would this be better suited for something like an old computer running pfsense where I have command line access?

πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/a-aron087
πŸ“…︎ Jan 30 2022
🚨︎ report
My work wants to track my IP address. How do I spoof it to show a specific area/location?

Basically what above says. I Work remotely from a van, but use hotspot & have to travel a bit around my state & surrounding states to help family with various issues. Work wants me to stay in a single area of my state and monitors IP address (it's a work laptop) so how do I spoof it to always show the same area? Thanks

πŸ‘︎ 10
πŸ’¬︎
πŸ‘€︎ u/LCARecords
πŸ“…︎ Dec 15 2020
🚨︎ report
Spoofing MAC address

Hello, I have been trying to spoof my MAC address and was successful on one computer but on another it didn't work. I was wondering why this would be happening. Could anyone help me out with this?

πŸ‘︎ 19
πŸ’¬︎
πŸ‘€︎ u/Mrpepper_42
πŸ“…︎ Dec 15 2021
🚨︎ report
Type in an IP address and visualize the network(s) its connected to! stat.ripe.net/special/bgp…
πŸ‘︎ 2k
πŸ’¬︎
πŸ‘€︎ u/Netflix-Is-A-Joke
πŸ“…︎ Jan 30 2022
🚨︎ report
Changing/spoofing my IP address + MAC address on virtual box (Windows 7 Ultimate)

Hello people,

In my case I am running hosting my VM on a Windows 10 desktop and my goals are as follows :

  1. Not reveal that I am using a VM 2.Not reveal any data of my host machine
  2. Hide my IP address (would I install a VPN on my host machine or my VM)
  3. Spoof my MAC address

I am inexperienced with the intricacies and workings of VMware so I apologise if I have fucked up terminology/don’t understand how VM properly operates. I would also appreciate any information related to the subject of untraceability/anonymity while using a VM.

πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/liljjl
πŸ“…︎ May 03 2019
🚨︎ report
A restroom? More like an IP address.
πŸ‘︎ 19
πŸ’¬︎
πŸ‘€︎ u/avid_dirt_chewer
πŸ“…︎ Nov 27 2021
🚨︎ report

Please note that this site uses cookies to personalise content and adverts, to provide social media features, and to analyse web traffic. Click here for more information.