INTRODUCTION OF IP SPOOFING
#1

INTRODUCTION OF IP SPOOFING


.ppt   IP SPOOFING.ppt (Size: 494 KB / Downloads: 1)

Types of spoofing

IP spoofing: Attacker uses IP address of another computer to acquire information or gain access.
Email spoofing: Attacker sends email but makes it appear to come from someone else
Web spoofing: Attacker tricks web browser into communicating with a different web server than the user intended.

IP Spoofing

IP spoofing is the creation of tcp/ip packets with somebody else’s IP address in the header.
Routers use the destination IP address to forward packets, but ignore the source IP address.
The source IP address is used only by the destination machine, when it responds back to the source.
When an attacker spoofs someone’s IP address, the
victim’s reply goes back to that address.

Blind IP Spoofing

Usually the attacker does not have access to the reply, abuse trust relationship between hosts.
For example: Host C sends an IP datagram with the address of some other host (Host A) as the source address to Host B. Attacked host (B) replies to the legitimate host (A).

Man in the middle attack

If an attacker controls a gateway that is in the delivery route, he can
Sniff the traffic
Intercept the traffic
Modify traffic
This is not easy in the internet because of hop by hop routing, unless source routing is used.

CONCLUSION

IP spoofing is less of a threat today due to the use of random sequence numbering.
Many security experts are predicting a shift from IP spoofing attacks to application-related spoofing.
Sendmail is one example, that when not properly configured allows anyone to send mail as president[at]whitehouse.gov.

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: abstract and introduction toip spoofing,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  INTRODUCTION astru 0 908 27-09-2014, 05:50 PM
Last Post: astru
  web spoofing full report computer science technology 9 10,970 26-03-2014, 06:29 AM
Last Post: Guest
  INTRODUCTION OF INTRANET CHATTING computer girl 1 3,113 24-02-2014, 01:48 AM
Last Post: Guest
  A Quick Introduction to Voice over Internet Protocol (VoIP) computer girl 0 1,332 09-06-2012, 05:50 PM
Last Post: computer girl
  Introduction of Mobile Agents computer girl 0 838 05-06-2012, 12:48 PM
Last Post: computer girl
  An Introduction to Low Power Design in VLSI computer science crazy 1 4,035 03-03-2012, 01:01 PM
Last Post: seminar paper
  Controlling IP Spoofing Through Inter-Domain Packet Filters seminar surveyer 1 2,479 29-02-2012, 12:51 PM
Last Post: seminar paper
  Introduction to the C Programming Language seminar class 1 6,575 14-02-2012, 01:43 PM
Last Post: seminar paper
  ip spoofing seminars report computer science crazy 16 23,947 26-01-2012, 02:33 PM
Last Post: seminar addict
  An Introduction to TCP/IP ( Download Full Seminar Report ) computer science crazy 9 9,223 12-01-2012, 09:40 AM
Last Post: seminar addict

Forum Jump: