spoofing full report
#1

Types of Spoofing

IP
Email
Web
Non-network (social engineering)
IP Spoofing
Keep in mind that the replies will go to the spoofed return address.
Easy to do.. simply change your machineâ„¢s IP address. You may have to alter your routing table so that the packets

get delivered.
Three basic flavors of IP spoof attacks:
Basic Address Change
Use of source routing to intercept packets
Exploitation of a trust relationship (UNIX)
Basic IP Address Change

Low tech “ no replies are received.
Typically only used to extend blame to innocent persons, or for DoS
Simple to do
Protect against with good firewall rules “ keep your machines from launching a spoofed IP “ router filters
Limit configuration access on machines
Programs like arpwatch that keep track of IP/MAC pairings
Source Routing

Source routing is one of the IP options that allows the specification of an IP address that should be on the route

for the packet delivery.
This allows someone to use a spoofed return address, and still see the traffic by placing his machine in the path.
Doesnâ„¢t work very well these days, since most routersâ„¢ default configuration is to not allow source routing (the

option is ignored, or the packets are dropped)
Two Types:
Loose Source Routing (LSR)
Strict Source Routing (SRS)
Trust Relationships

UNIX systems are notorious for this.
A trust relationship uses IP address for authentication. From a convenience standpoint, this is really easy.
Protection is simple “ do not allow them to be used.
Email Spoofing

Done for 3 main purposes:
Hide Identity
Impersonate someone to extend blame
Social engineering “ impersonate someone to get information or privileges
Email Spoofing Techniques

Similar email addresses
Modify mail client
Telnet to port 25 to manipulate the SNMP agent.
Anonymous Remailers can be used “ forwards an email, concealing who really sent the message.
Similar Email Address

Attacker registers and address that looks very similar to the person he wants to impersonate.
Defense
Employee education and awareness.
Set up the company™s email so that it can be accessed remotely “ thereby eliminating the ˜need™ to use another

email server. Policy that states that all business email must be via the businesses email server.
Modifying a Mail Client

Edit the client to change the Ëœfromâ„¢ address.
Any replies will go back to the spoofed address, however.
Defense
Strict policy against any employee doing this.
Education “ look at the full email header. Email logging.
Telnet to Port 25 “ Email Relaying

Most email servers today do not allow email relaying. They only allow emails to be sent to/from their range of IP

addresses. They insure that the recipientâ„¢s domain is the same domain as the mail server. The attacker can run his

own email server, but then he is easier to trace.
Defense - Do not allow Email relaying on your STMP servers
Web Spoofing
Similar URLâ„¢s
Protection:
Educate Users
Use a Ëœserver-side certificateâ„¢. Still, users should be educated on how to recognize a valid certificate, since

these can be spoofed as well.
MitM Attacks

ËœMan-in-the-Middleâ„¢ refers to a machine that is set up so that traffic between two other machines must pass through

the MitM machine.
Difficult to setup, especially over the Internet. Not so difficult in a LAN environment.
Provides no additional advantages over a ˜sniffer™ “ is actually just a way to implement a sniffer.
Defense:
Encryption “ however, MitM can refer to an intermediate encrypter
Strong perimeter security for Internet MitM attacks.
Only secure as the weakest page link “ the MitM can attack from either end. So, even if you have strong security, but

your partner does not, the MitM is possible from the other end.
URL Re-Writing
Attacker is re-directing web traffic to another site that is controlled by the attacker
Accomplished by re-writing the links on a web page.
Only way to tell is by looking at the HTML code, or watching the page link in the browser
The page link can be set to Ëœpass throughâ„¢ the attackerâ„¢s machine (another form of MitM)
<a href=http://attackersmachinehttp://google.com

There are sites which do this on purpose for the user. The Anonymizer.com site is one such site.
Defense
Again “ educate your users
Look at the actual URL
Examine the source
Defend your pages against re-write. Install latest patches.
Tracking State

Attacker visits a site and impersonates a user.
It is important for business purposes to keep track of what users do on your site.
Typically handled with..
Cookies
URL Session Tracking
Hidden Form Elements
Cookies
Easy to use and quite popular
Two types:
Persistent “ stored on the hard drive as a text file, and accessed by the browser
Non-persistent “ stored in memory and disappears when machine is shut down
If a hacker wants to impersonate another user, he simply needs to copy their cookie onto his machine.
Cookies can be sniffed.
Cookies can be guessed. Hacker gets his own cookie, then makes experimental changes in some of the values.
Can NOT be used to pass viruses or malicious code
Cookie Defense

Insure that cookie files cannot be obtained from user™s machines “ password-protected screen savers, for example
Insure that your companyâ„¢s cookies use un-guessable cookie IDâ„¢s.
Cookies can be disabled “ however many convenience functions are lost, and some web sites may not even work. They

can be set to Ëœapproveâ„¢ on each occurrence, but this can get quite annoying and eventually have no effect (user

simply says Ëœyesâ„¢ to all)
URL Session Tracking

Another way of tracking session information is to place it right in the URL:
http://somecompanyordering/id=9872651667.659843

Attacker may be able to guess an ID. Yahoo chat is an example of this.
If there are enough digits in the ID, then guessing a valid one would be difficult. This is the key to using this

technique securely.
There is little that the user can do for protection. You might educate them to be wary of any ID values that do not

have a large number of digits.
Hidden Form Elements

HTML can include form elements that have ˜hidden™ properties “ that is they are not displayed
The userâ„¢s ID can be stored in these forms.
The attacker can view the HTML code and find the formâ„¢s name and use the url area to edit the information in the

form, thereby accomplishing the same thing.
Defense is still the same “ hard to guess ID™s.
Non-technical Spoofing

Calls help desk, impersonating an employee
Calls to IT, acting like a vendor to find out software being used
Calls an employee, impersonating a manager in order to get reports, etc.
Impersonate a company that supplies/supports target company “ by implanting false information (say a postcard with

a new phone number)

courtesy
campus.murraystate.edu/
Reply
#2

[attachment=14117]
Spoofing
The False Digital Identity
What is Spoofing?
Spoofing is the action of making something look like something that it is not in order to gain unauthorized access to a user's private information.
IP Spoofing
IP Spoofing
IP spoofing is the act of manipulated the headers in a transmitted message to mask a hackers true identity so that the message could appear as though it is from a trusted source.
Attacks
Man-in-the-Middle attack
In a Man-in-the-Middle attack, the message sent to a recipient is intercepted by a third-party which manipulates the packets and resends it own message.
Denial of Service (DoS) Attack
A DoS attack is when a attacker floods a system with more packets than its resources can handle.
Solutions
Monitoring packets using network monitoring software.
Installing a filtering router
URL Spoofing
URL spoofing occurs when one website poses as another. The URL address displayed appears to be legitimate but is not the actual URL of the site.
For example the URL chase.com may be displayed in the website however information is sent to an entirely different location.
Attacks
Phishing
Using a Fraudulent site to obtain sensitive information
Solutions
Browser security patches
Email Spoofing
Altering the header of an email so that the email appears to be sent from someone else
Usage:
Cause confusion or discredit a person
Social engineering (phishing)
Hide the identity of the sender (spamming)
Relay replies of your own messages to a different mailbox
Detection
How can you find out if an email is spoofed?
Check the content of the email:
Is the content weird in some way, or really unexpected from the sender?
Does it contain a form?
Does it request to either confirm or update login or any kind of information?
Check the header of the email
What if someone pretends to be me?
You can’t really do anything
How do you prevent it?
Do not post your email address on boards, forums or chats
Do not use your email address as a username to login to a site
Have separate addresses for different online activities
What makes email spoofing possible?
It is easy to spoof email because SMTP (Simple Mail Transfer Protocol) lacks authentication. If a site has configured the mail server to allow connections to the SMTP port, anyone can connect to the SMTP port of a site and (in accordance with that protocol) issue commands that will send email that appears to be from the address of the individual's choice; this can be a valid email address or a fictitious address that is correctly formatted.
cert.org
Prevention
Yahoo! – DomainKeys – “Internet standard from Yahoo! that lets us confirm whether emails are really from their claimed domain “
Prevention
CertifiedMail
CertifiedMail's Secure Email System for in-house use enhances your existing email system by providing secure, trackable delivery of e-mail messages to any Internet recipient.
Prevention
Mail Server Authentication
Digitally Signed Email with Desktop Verification
Digitally Signed Email with Gateway Verification
Mail Server IP Verification
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: web spoofing seminar report for downloading, project report on ip spoofing, advantages disadvantages of web spoofing seminar report, subversion blame, ida maria, report on web spoofing, full report on web spoofing,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 42,395 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 30,870 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 25,109 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 26,826 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 66,690 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 74,804 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 23,570 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 41,619 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 44,008 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,037 01-05-2015, 03:36 PM
Last Post: seminar report asees

Forum Jump: