0% found this document useful (0 votes)
51 views2 pages

Spoofing Is The Creation of TCP/IP Packets Using Somebody Else's IP

Spoofing is the creation of TCP/IP packets using somebody else's IP address. While IP spoofing cannot be used to hide one's IP address when surfing the internet or chatting online, as it prevents a normal network connection from being established, it is an integral part of network attacks that do not require seeing responses, such as blind spoofing, man-in-the-middle attacks, routing redirects, source routing, and flooding attacks which can fill receive queues or cause everyone to respond to the victim.

Uploaded by

hisatish11
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views2 pages

Spoofing Is The Creation of TCP/IP Packets Using Somebody Else's IP

Spoofing is the creation of TCP/IP packets using somebody else's IP address. While IP spoofing cannot be used to hide one's IP address when surfing the internet or chatting online, as it prevents a normal network connection from being established, it is an integral part of network attacks that do not require seeing responses, such as blind spoofing, man-in-the-middle attacks, routing redirects, source routing, and flooding attacks which can fill receive queues or cause everyone to respond to the victim.

Uploaded by

hisatish11
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Spoofing is the creation of TCP/IP packets using somebody else's IP

address. Routers use the "destination IP" address in order to forward


packets through the Internet, but ignore the "source IP" address. That
address is only used by the destination machine when it responds back to
the source.

A common misconception is that "IP spoofing" can be used to hide your IP


address while surfing the Internet, chatting on-line, sending e-mail, and so
forth. This is generally not true. Forging the source IP address causes the
responses to be misdirected, meaning you cannot create a normal network
connection.

However, IP spoofing is an integral part of many network attacks that do not


need to see responses (blind spoofing).

Examples of spoofing:

man-in-the-middle
packet sniffs on link between the two end points, and can
therefore pretend to be one end of the connection
routing redirect
redirects routing information from the original host to the
hacker's host (this is another form of man-in-the-middle attack).
source routing
redirects indvidual packets by hackers host
blind spoofing
predicts responses from a host, allowing commands to be sent,
but can't get immediate feedback.
flooding
SYN flood fills up receive queue from random source addresses;
smurf/fraggle spoofs victims address, causing everyong respond
to the victim.
 Intrusions (19)  DNS (3)
Attacks that make use of IP spoofing  IPX (1)
 MAC (2)  TCP (6)
 ARP (1) session creation and hijacking
 Web (2)

 IP-spoofing Demystified (Trust-Relationship Exploitation)-by


daemon9 / route / infinity for Phrack Magazine
 RFC2267 -This paper discusses a simple, effective, and
straightforward method for using ingress traffic filtering to prohibit
DoS attacks which use forged IP addresses to be propagated from
'behind' an Internet Service Provider's (ISP) aggregation point.
 DoE: CIAC: Internet Address Spoofing and Hijacked Session
Attacks-
 CERT: CA-
95.01.IP.spoofing.attacks.and.hijacked.terminal.connections
 CERT: CA-96.21.tcp_syn_flooding
 Technical details of the attack described by Markoff in NYT-
Tsutomu Shimomura describes how Kevin Mitnick used IP spoofing
in order to break into his systems.
 http://www.research.att.com/~smb/papers/ipext.pdf
 http://www.nmrc.org/faqs/hackfaq/hackfaq-25.html#ss25.1
 http://www.ryanspc.com/ipspoof.html
 http://www.tlsecurity.com/Textware/spoofing/ip-forgery.txt
 http://www.tlsecurity.com/Textware/spoofing/ip-demystified.txt
 http://www.tlsecurity.com/Textware/spoofing/IP-spoof.zip
 http://www.coast.net/~emv/tubed/spoofing.html

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy