?
Solved

Can an IP address be cloned by a hacker?

Posted on 2003-10-24
4
Medium Priority
?
276 Views
Last Modified: 2013-12-04
If someone hacked into my computer and then posted something on a forum or any website for that matter, will it log my IP address or theirs?  

The reason I am asking is that someone posted something on my forum recently that was offensive and I logged their IP address and when I confronted them about it they explained that their computer was hacked into.  Is this a plausible explanation or is this person just lying?
0
Comment
Question by:s_montero
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 18

Accepted Solution

by:
liddler earned 100 total points
ID: 9617906
It depends on what you used to log their IP address, IPs can be spoofed, but it seems unlikely that a hacker would spoof the address of someone you know, who has presumably used your forum.  
How was their machine hacked?  How did they fix it?  Anything is plausible, but lying seems more likely
0
 
LVL 19

Assisted Solution

by:Dexstar
Dexstar earned 100 total points
ID: 9617913
s_montero,

> Is this a plausible explanation or is this person just lying?

It is *POSSIBLE* that someone hacked into their computer and used it to submit form data to the forum website that posted the offensive message.  In that case, the web server would definitely log the IP of the hacked computer.

But remember Occam's Razor:  The simplest explanation is usually the one that is correct.
Which is more simple?
  A) Someone went through all the effort to hack into that one person's computer to post an offensive message on some website
or
  B) That person didn't think you'd be able to figure out it was them.

I don't think their story is very plausible at all.

Hope that helps,
Dex*
0

Featured Post

Four New Appliances. Same Industry-leading Speeds.

But don't take it from us.  The Firebox M370 is Miercom tested and Miercom approved, outperforming its competitors for stateless and stateful traffic throughput scenarios.  Learn more about the M370, M470, M570 and M670 and find the right solution for your organization today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
OfficeMate Freezes on login or does not load after login credentials are input.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question