Seminar On Spoofing
Seminar On Spoofing
A B
trusted host
Basic Concept of IP Spoofing
A www.carleton.ca
10.10.10.1 134.117.1.60
http://www.carleton.c
a
spoofed
sender ip
sp
oo
fed
src pa
: ck
ds rand et
t: v o
ict m
im
sender
ip
s po
ofe partner
src dp
:p ac
ds art ke
t: v ne t
ict r
im
Session hijacking
Who is this freak ?
None of u know who is spying on u ? Isn`t is
amusing..?
Uses of IP Spoofing :
To defeat networks security :
> Such as authentication based on IP addresses.
This type of attack is most effective where trust
relationships exist between machines.
>For example, some corporate networks have internal
systems trust each other, a user can login without a
username or password as long he is connecting from
another machine on the internal network. By spoofing
a connection from a trusted machine, an attacker may
be able to access the target machine without
authenticating.
Fallout of IP based
authentication:
Defense against IP spoofing:
Packet filtering- one defense against IP
spoofing
› Ingress filtering- blocking of packets from
outside the network with a source address
inside the network
› Egress filtering –blocking outgoing
packets from inside the network source
address.
Filtering:
if src_addr is from
10.10.0.0
then drop
Internet
else forward
10.10.0.0
Router Firewall
10.10.10.0
if src_addr is IDS
from 10.10.0.0
then forward B
else drop
Defense against IP
spoofing:
Upper Layers :
Some upper layer protocols provide their own
defense against IP spoofing.
For example, TCP uses sequence numbers
negotiated with the remote machine to ensure
that the arriving packets are part of an
established connection. Since the attacker
normally cant see any reply packets, he has to
guess the sequence number in order to hijack
the connection.
Web Spoofing :
It’s a security attack that allows an
adversary to observe and modify all
web pages sent to the victim’s machine
and observe all information entered
into forms by the victim.
Guess what ? I hv spoofed ur
web browser . Rn’t fealing
queasy.?
Web Spoofing :
The attack is initiated when a victim
visits a malicious web page, or
receives a malicious email message.
The attack is implemented using
JavaScript and Web serves plug-ins.
Can`t u imbecile see this is a
hoax ?
Dangers of Web Spoofing:
After your browser has been fooled,
the spoofed web server can send
you fake web pages or prompt you
to provide personal information
such as login Id, password, or even
credit card or bank account
numbers.
How to prevent it :
Don’t click links in emails instead always copy and
paste, or even better manually type the URL in.
When entering personal or sensitive information,
verify the URL is as you expect, and the site’s SSL
certificate matches that URL.
Understand why you’re providing the information-
does it make sense? Does the site need to know
your SSN?
Email Spoofing :
E-mail spoofing is the forgery of an
e-mail header so that the message
appears to have originated from
someone or somewhere other than
the actual source.
Email Spoof Protection:
Double check the email you are replying to,
make sure that the letters are what they
truly seem. For example, l(lower case L) is
not the same as I(upper case i).
Look at the IP information of the email
header. If an email originated from inside
your network, the sender should have very
similar IP address.
Non-Technical Spoofing: