Packet generators - are these possible?

  • Thread starter Thread starter rcgldr
  • Start date Start date
  • Tags Tags
    Generators
Click For Summary

Discussion Overview

The discussion revolves around the possibility of generating and outputting packets with false IP addresses, particularly in the context of potential hacks against online games. Participants explore the implications of packet generation, interception, and spoofing, as well as the motivations behind such actions.

Discussion Character

  • Debate/contested
  • Technical explanation
  • Conceptual clarification

Main Points Raised

  • One participant questions whether a program could generate packets with false IP addresses without being blocked by an ISP, citing a specific incident in an online game that raised suspicions of packet corruption.
  • Another participant mentions hacks involving the interception of network streams and the injection of packets that mimic other traffic but may not have the correct hash codes.
  • A reference to a case of packet injection in banking is provided, illustrating how malicious actors might flood a system with bad transfers to manipulate outcomes.
  • IP address spoofing is identified as a relevant concept, with a participant noting its potential legitimate uses, such as server testing, while acknowledging that some testing could be conducted on local networks instead of the internet.

Areas of Agreement / Disagreement

Participants express varying views on the feasibility and implications of packet generation and spoofing. There is no consensus on the specific methods or ethical considerations surrounding these actions, and the discussion remains unresolved regarding the potential for misuse in gaming contexts.

Contextual Notes

The discussion includes assumptions about the capabilities of network programs and the behavior of ISPs, which are not fully explored. The implications of packet injection and spoofing are also context-dependent, with references to specific scenarios that may not generalize.

rcgldr
Homework Helper
Messages
8,948
Reaction score
687
I know that there are packet sniffers, but I'm wondering if a computer is not behind a router (such as cable modem or dsl with external ip setups (usually for multiple external ip's, one for each computer), if a program made to generate and output packets could directly generate a packet with a false ip (maybe the ISP would prevent this). In one of the games I play, there was a recent one time incident where somehow players were being affected in a strange non game like behaviour, and since the game hasn't been updated in over a year, it seems unlikely that this would be a game bug, so my next guess is somehow packets between players were somehow getting deliberately corrupted. There may be other explanations, such as packets without a fake ip creating some sort of false collision detection on the other players games to create the bizarre reactions I saw (I wasn't affected, just witnessed the effects on two other players).

I'm not trying to create such a thing, I only want to know if it's possible without explaining how it could be done (I don't want to contribute to the creation of a game hack).
 
Technology news on Phys.org
Yes, I've heard of hacks where a network stream is intercepted and packets are injected into the mix that look similar to the other traffic but may not the correct hash codes.

In one case brought up by my instructor of communications, he told us of an example where crooks had intercepted an interbank network and slowly injected badly coded money transfers. The idea was to flood the bank with transfers that had to be reviewed in the hopes that the reviewer would eventually conclude there's something wrong with stream today and that the bad transfers are actually okay to approve.

Here's something on packet injections:

http://en.m.wikipedia.org/wiki/Packet_injection
 
My question was about a potential type of hack against a particular game, where the goal could be just interfering with game play and making it appear that the source of the interference was from another source via the spoofed ip. Reading the wiki article, it appears that it is possible and some cases has a legitimate use, such as testing a server (although some or most of this testing could be done on a local network versus the internet).
 

Similar threads

Replies
13
Views
4K
  • · Replies 1 ·
Replies
1
Views
3K
  • · Replies 1 ·
Replies
1
Views
2K
  • · Replies 27 ·
Replies
27
Views
4K
  • · Replies 20 ·
Replies
20
Views
3K
Replies
18
Views
6K
Replies
5
Views
3K
  • · Replies 2 ·
Replies
2
Views
8K
  • · Replies 2 ·
Replies
2
Views
2K
  • · Replies 2 ·
Replies
2
Views
1K