ANA Spoofer Project: “Introduction (or, does spoofing matter?):
The Internet architecture provides no explicit mechanism to prevent packets with forged headers from traversing the network. By ‘spoofing’ the source address of an IP packet, a malicious user or compromised host can send packets toward a victim anonymously.
Techniques such as ingress and egress address filtering (RFC2827, RFC3704, RFC1918) and unicast reverse path forwarding (uRPF) are used to prevent spoofing, but these are typically useful only at the edge of the network and are often sporadically applied. While attacks emanating from zombie farms generally do not bother spoofing their source address, spoofing is still prevalent on the Internet from analysis of backscatter.
Previous work (Snoeren, et al., Bellovin) has suggested efficient means to trace spoofed packets back to their origin, but today finding the source of spoofed packets remains an operationally difficult problem. This project seeks to determine the extent to which spoofing is currently possible and a relevant issue on the Internet. ”
Help support this project by downloading one of the binaries and running it. It takes all of a minute to install and run.