You can try a standard, not spoofed ping and see the result in the raw output below (LINK). If you want to test if your ISP is NOT blocking spoofed packets, you can use tools like nping (part of the fabulous nmap) or packETH. Unless the traffic gets filtered (what should be the case), you might see your spoofed echo request in the output. A sample nping syntax would be nping -S a.b.c.d tools.uebi.net - This would send an ICMP ping with the spoofed address of a.b.c.d (although it should be a proper IP, of course ;-) BTW: nping/nmap can be used as a portable application, but if you are unable to run it (missing privileges or whatever), you could also use a Cisco router to send a ping with a specified source IP (this has to exist on the router, so you could assign it to a Loopback interface, but take care that you don't blackhole any traffic!!!) To see the received echo requests of the last minute (UTC timestamp) \\ CLICK HERE // You should know what you are doing! This tool is offered as is. Use at your own risk!!! Don't do anything you are not allowed to! You will go to jail, not me! |
|||