Solved

Can an IP address be cloned by a hacker?

Posted on 2003-10-24
4
261 Views
Last Modified: 2013-12-04
If someone hacked into my computer and then posted something on a forum or any website for that matter, will it log my IP address or theirs?  

The reason I am asking is that someone posted something on my forum recently that was offensive and I logged their IP address and when I confronted them about it they explained that their computer was hacked into.  Is this a plausible explanation or is this person just lying?
0
Comment
Question by:s_montero
4 Comments
 
LVL 18

Accepted Solution

by:
liddler earned 25 total points
ID: 9617906
It depends on what you used to log their IP address, IPs can be spoofed, but it seems unlikely that a hacker would spoof the address of someone you know, who has presumably used your forum.  
How was their machine hacked?  How did they fix it?  Anything is plausible, but lying seems more likely
0
 
LVL 19

Assisted Solution

by:Dexstar
Dexstar earned 25 total points
ID: 9617913
s_montero,

> Is this a plausible explanation or is this person just lying?

It is *POSSIBLE* that someone hacked into their computer and used it to submit form data to the forum website that posted the offensive message.  In that case, the web server would definitely log the IP of the hacked computer.

But remember Occam's Razor:  The simplest explanation is usually the one that is correct.
Which is more simple?
  A) Someone went through all the effort to hack into that one person's computer to post an offensive message on some website
or
  B) That person didn't think you'd be able to figure out it was them.

I don't think their story is very plausible at all.

Hope that helps,
Dex*
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
This Micro Tutorial will give you a basic overview how to record your screen with Microsoft Expression Encoder. This program is still free and open for the public to download. This will be demonstrated using Microsoft Expression Encoder 4.
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

815 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now