IP and Web spoofing
#1


[attachment=5170]


Introduction


Spoofing means pretending to be something you are not. In Internet terms it means pretending to be a different Internet address from the one you really have in order to gain something. That might be information like credit card numbers, passwords, personal information or the ability to carry out actions using someone else’s identity.

IP spoofing attack involves forging one's source address. It is the act of using one machine to impersonate another. Most of the applications and tools in web rely on the source IP address authentication. Many developers have used the host based access controls to secure their networks. Source IP address is a unique identifier but not a reliable one. It can easily be spoofed.

Web spoofing allows an attacker to create a "shadow copy" of the entire World Wide Web. Accesses to the shadow Web are funneled through the attacker's machine, allowing the attacker to monitor the all of the victim's activities including any passwords or account numbers the victim enters. The attacker can also cause false or misleading data to be sent to Web servers in the victim's name, or to the victim in the name of any Web server. In short, the attacker observes and controls everything the victim does on the Web.

The various types of spoofing techniques that we discuss include TCP Flooding, DNS Server Spoofing Attempts, web site names, email ids and page link redirection.
Reply
#2
Hi
its a good topic.can i get ppt for this
Reply
#3

Hi,
visit this page for the ppt on web spoofing:
http://scribddoc/27611255/Web-Spoofing
http://scribddoc/36206648/Spoofing
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: ppt and report on seminar topic email spoofing**##46069## **mine detection usung radar bullets, web spoofing attacker, web spoofing wikipedia, web spoofing countermeasures, web spoofing seminar report, web spoofing definition, advantages and disadvantages of web spoofing,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  web spoofing full report computer science technology 9 11,027 26-03-2014, 06:29 AM
Last Post: Guest
  Web Services Architecture computer topic 0 7,578 25-03-2014, 10:20 PM
Last Post: computer topic
  Opera (web browser) computer science crazy 3 4,361 08-07-2013, 12:45 PM
Last Post: computer topic
  Relation-Based Search Engine in Semantic Web project topics 1 2,160 21-12-2012, 11:00 AM
Last Post: seminar details
  A survey of usage of Data Mining and Data Warehousing in Academic Institution and Lib seminar class 1 2,124 29-11-2012, 12:56 PM
Last Post: seminar details
  Recent Researches on Web Page Ranking computer science crazy 1 1,806 30-10-2012, 02:04 PM
Last Post: seminar details
  Intelligent Electronic Devices (IEDs) and Supervisory Control and Data Acquisition computer girl 0 1,147 09-06-2012, 06:01 PM
Last Post: computer girl
  Ontology Description using OWL to Support Semantic Web Applications computer girl 0 1,024 09-06-2012, 02:25 PM
Last Post: computer girl
  VWS: Applying virtualization techniques to Web Services computer girl 0 1,109 09-06-2012, 11:38 AM
Last Post: computer girl
  INTRODUCTION OF IP SPOOFING computer girl 0 1,033 08-06-2012, 12:01 PM
Last Post: computer girl

Forum Jump: