Solved

Can an IP address be cloned by a hacker?

Posted on 2003-10-24
4
254 Views
Last Modified: 2013-12-04
If someone hacked into my computer and then posted something on a forum or any website for that matter, will it log my IP address or theirs?  

The reason I am asking is that someone posted something on my forum recently that was offensive and I logged their IP address and when I confronted them about it they explained that their computer was hacked into.  Is this a plausible explanation or is this person just lying?
0
Comment
Question by:s_montero
4 Comments
 
LVL 18

Accepted Solution

by:
liddler earned 25 total points
ID: 9617906
It depends on what you used to log their IP address, IPs can be spoofed, but it seems unlikely that a hacker would spoof the address of someone you know, who has presumably used your forum.  
How was their machine hacked?  How did they fix it?  Anything is plausible, but lying seems more likely
0
 
LVL 19

Assisted Solution

by:Dexstar
Dexstar earned 25 total points
ID: 9617913
s_montero,

> Is this a plausible explanation or is this person just lying?

It is *POSSIBLE* that someone hacked into their computer and used it to submit form data to the forum website that posted the offensive message.  In that case, the web server would definitely log the IP of the hacked computer.

But remember Occam's Razor:  The simplest explanation is usually the one that is correct.
Which is more simple?
  A) Someone went through all the effort to hack into that one person's computer to post an offensive message on some website
or
  B) That person didn't think you'd be able to figure out it was them.

I don't think their story is very plausible at all.

Hope that helps,
Dex*
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Suggested Solutions

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
OfficeMate Freezes on login or does not load after login credentials are input.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now