View stunning SlideShares in full-screen with the new iOS app!Introducing SlideShare for AndroidExplore all your favorite topics in the SlideShare appGet the SlideShare app to Save for Later — even offline
View stunning SlideShares in full-screen with the new Android app!View stunning SlideShares in full-screen with the new iOS app!
The attacker’s first trick is to rewrite all of the URLs on some web page so that they point to the attacker’s server rather than the real server..
Once the attacker’s server has fetched the real document needed to satisfy the request, the attacker rewrites all of the URLs. in the document into the same special form. Then the attacker’s server provides the rewritten page to the victim’s browser.
If the victim fallows a link on the new page, the victim remains trapped in the attacker’s false web.
When the victim submits a form, the submitted data goes to the attacker’s server. The attacker’s server can observe and even modify the submitted data, doing whatever malicious editing desired, before passing it on to the real server.
Spoofing attacks in the physical world as well as the electronic world
In the physical world For example, there have been several incidents in which criminals set up bogus automated teller machines. the criminal copy the victim’s card and use the duplicate.
In the these attack people were fooled for the context what they saw. The location of the machine and The appearance of their electronic displays.
People using computer system often makes security relevant decisions based on contextual cues they see. For example you might decide to type in you account number because you believe you are visiting your bank’s web page. This belief might arise because the page has a familiar look.
the attacker can passively watch the traffic, recording which pages the victim visits and the contacts of those pages. ( This allows the attacker to observe any account numbers or passwords the victim enters .)
the attacker can modify any of the data traveling in either direction between the victim and the Web. ( The attacker would change the product number, quantity or ship to address .)
The victim’s browser says it has secure connection because it does have one. Unfortunately the secure connection I to the and not the place the victim is think it is. The victim’s browser think everything is fine: it was told to the secure connection indicator only gives the victim a false sense of security.
How does the Attack Work? 1 . Request Spoof URL www.attacker.org www.server.com 2. Request real URL 3. Real Page contents 4. Change page 5. Spoofed page Web spoofing