Spoofing Is The Creation of TCP/IP Packets Using Somebody Else's IP
Spoofing Is The Creation of TCP/IP Packets Using Somebody Else's IP
Examples of spoofing:
man-in-the-middle
packet sniffs on link between the two end points, and can
therefore pretend to be one end of the connection
routing redirect
redirects routing information from the original host to the
hacker's host (this is another form of man-in-the-middle attack).
source routing
redirects indvidual packets by hackers host
blind spoofing
predicts responses from a host, allowing commands to be sent,
but can't get immediate feedback.
flooding
SYN flood fills up receive queue from random source addresses;
smurf/fraggle spoofs victims address, causing everyong respond
to the victim.
Intrusions (19) DNS (3)
Attacks that make use of IP spoofing IPX (1)
MAC (2) TCP (6)
ARP (1) session creation and hijacking
Web (2)