0% found this document useful (0 votes)
54 views10 pages

IP SPoofing

IP spoofing allows attackers to disguise their identities by modifying packet header information such as source IP addresses. There are two main types: source IP spoofing, which is more common, and destination IP spoofing. IP spoofing poses risks like denial-of-service attacks and man-in-the-middle attacks, where the attacker intercepts traffic between a victim and trusted source by spoofing the source IP address. Defenses include not revealing internal IP addresses, monitoring for signs of spoofing, and using filtering routers. While less frequent now, IP spoofing still poses risks and should be addressed by security administrators.

Uploaded by

Manav Gaur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views10 pages

IP SPoofing

IP spoofing allows attackers to disguise their identities by modifying packet header information such as source IP addresses. There are two main types: source IP spoofing, which is more common, and destination IP spoofing. IP spoofing poses risks like denial-of-service attacks and man-in-the-middle attacks, where the attacker intercepts traffic between a victim and trusted source by spoofing the source IP address. Defenses include not revealing internal IP addresses, monitoring for signs of spoofing, and using filtering routers. While less frequent now, IP spoofing still poses risks and should be addressed by security administrators.

Uploaded by

Manav Gaur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

IP SPOOFING

Submitted BY :- Manav Gaur

Submitted To :- Mr. Vishnu Kumar Barodiya


• INTRODUCTION

• How IP Spoofing Works ?

• Types of IP Spoofing

• RISKS ASSOCIATED

• Example of IP Spoofing Attack

• DIFFERENT WAYS

• CONCLUSION
INTRODUCTION
IP Spoofing is essentially a technique used by
a hacker to gain unauthorized access to Computers.
The attacker creates packets, changing the source IP
address to impersonate a different computer system,
disguise the sender's identity or both.

3
HOW IP SPOOFING WORKS

IP spoofing works by modifying the packet header


of IP packets. The packet header contains
information about the source and destination IP
addresses, as well as other information such as the
packet type and length. By modifying the packet
header, the attacker can make it appear as if the
packets are coming from a different source IP
address.
TYPES OF IP SPOOFING ARE:-
SOURCE IP SPOOFING DESTINATION IP SPOOFING

• This is the most common type of IP spoofing. • This type of IP spoofing is less common
than source IP spoofing.
• It involves changing the source IP address in
the packet header to make it appear as if the • It involves changing the destination IP
packets are coming from a trusted source. address in the packet header to make it
appear as if the packets are going to a
• For example, an attacker might spoof the IP
different destination.
address of a popular website in order to trick
users into clicking on a malicious link. • This can be used to launch denial-of-
service attacks against specific targets.
RISKS ASSOCIATED

• Denial-of-service attacks: An attacker can use IP Spoofing to flood a network or


system with a large number of requests, making it unavailable to legitimate users.
EXAMPLES OF IP
SPOOFING ATTACKS
o Man-in-the-middle attack:- In a man-in-the-middle attack, the
attacker spoofs the IP address of a trusted source in order to
intercept and modify traffic between the victim and the trusted
source. For example, an attacker might spoof the IP address of a
bank's website in order to steal users' login credentials.

o Ping of death:- In a ping of death attack, the attacker sends a ping


request to the victim's computer that is larger than the maximum size
of an IP packet. This can cause the victim's computer to crash.

7
DIFFERENT WAYS TO ADDRESS
IP SPOOFING
• Do not reveal any information regarding your internal IP addresses.This helps prevent those addresses from being
spoofed.
• Monitor incoming IP packets for signs of IP spoofing using network monitoring software. This essentially means an
incoming packet that claims to be from inside network is actually coming from outside your network. Finding one
means that an attack is underway.

Danger that IP spoofing contains is that some firewalls do not examine packets that appear to come from an internal IP
address.Routing packets through filtering router is possible, if they are not configured to filter incoming packets whose
source address is in local domain.

8
CONCLUSION
o IP spoofing attacks are becoming less frequent.

o Primarily because the Venues they use have become more


Secure and in some case no longer used.

o Spoofing can still be used and all security administrators should


address it.
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy