IP SPoofing
IP SPoofing
• Types of IP Spoofing
• RISKS ASSOCIATED
• DIFFERENT WAYS
• CONCLUSION
INTRODUCTION
IP Spoofing is essentially a technique used by
a hacker to gain unauthorized access to Computers.
The attacker creates packets, changing the source IP
address to impersonate a different computer system,
disguise the sender's identity or both.
3
HOW IP SPOOFING WORKS
• This is the most common type of IP spoofing. • This type of IP spoofing is less common
than source IP spoofing.
• It involves changing the source IP address in
the packet header to make it appear as if the • It involves changing the destination IP
packets are coming from a trusted source. address in the packet header to make it
appear as if the packets are going to a
• For example, an attacker might spoof the IP
different destination.
address of a popular website in order to trick
users into clicking on a malicious link. • This can be used to launch denial-of-
service attacks against specific targets.
RISKS ASSOCIATED
7
DIFFERENT WAYS TO ADDRESS
IP SPOOFING
• Do not reveal any information regarding your internal IP addresses.This helps prevent those addresses from being
spoofed.
• Monitor incoming IP packets for signs of IP spoofing using network monitoring software. This essentially means an
incoming packet that claims to be from inside network is actually coming from outside your network. Finding one
means that an attack is underway.
Danger that IP spoofing contains is that some firewalls do not examine packets that appear to come from an internal IP
address.Routing packets through filtering router is possible, if they are not configured to filter incoming packets whose
source address is in local domain.
8
CONCLUSION
o IP spoofing attacks are becoming less frequent.