IP Spoofing Settings contents.gifindex.gif

IP Spoofing Settings

This page enables IP spoofing tests. If either of these tests are enabled, the scanner will also check for TCP sequence number predictability. The following is a brief description of the available tests. For more information on the tests, see IP Spoofing

Check Spoof rsh: Attempts to spoof the rsh service.

Spoof Lists: Attempts to log in with the default user lists in rsh spoofing.

Spoof Source: Specify the IP address used as the source. If this is not specified, the scanner will choose an IP address which does not respond to a ping.

Spoof User: Specify the user name for the spoofing test.

Source Port: Specify the source port. This may be any port between 1 and 65535. The user can specify the source port from which a service scan will originate. When this option is exercised, the designated port on the scanning host is used as the source. Note: this option is not compatible with scanning multiple hosts. If a scan across a firewall yields more information with the source port set, the firewall rules should be reviewed.

Gateway Host: Specifies the hosts to use in source routing when performing a Stealth Scan of services.

SOCKS Host: Set the SOCKS host which the Scanner will use to access the scanned machine.

RLogin Spoof: Attempts to spoof the rlogin service.