SlideShare a Scribd company logo
1 of 15
IP SPOOFING
By IPSHITA NANDY
CSE,3RD YR, SEC-Y,234
Term IP Spoofing Indicates..?
⚫ Spoofing = Hocks / Tricks/Hiding
⚫ IP Spoofing = Hiding of Internet Protocol .
What is IP Spoofing..?
⚫ A Technique, used to gain
Unauthorized access to Machines.
⚫ It involves the creation of IP packets
which have a modified source
address.
⚫ IP Spoofing is also called IP Address
Forgery or Host File Hijack.
Why IP Spoofing is used..?
⚫ This eliminates the need for the hacker to provide a username and
password to log onto the network.
⚫ These are attacks that relate massive amounts of information being sent to
computers over a network in an attempt to crash the full network.
⚫ The hacker does not get caught because the origin of the messages cannot
be determined due to the bogus IP address.
How…?
Different Types of IP Spoofing…
⚫Denial of Service Attack(DOS attacks)
⚫Distributed Denial of Service(DDOS attacks)
⚫Man in the Middle Attack
⚫Non-Blind Spoofing
⚫Blind Spoofing
Denial-of-service(DOS) Attacks…
⚫ IP Spoofing is always used in DOS attacks.
⚫ DOS Attack is characterized by using a single computer to launch the attack
⚫ DOS attacks typically function by flooding a targeted machine with requests until normal
traffic is unable to be processed, resulting in denial-of-service to addition users.
Types of DOS Attacks:
>> Buffer overflow
>>Flood attacks
Distributed Denial-of-Service (DDoS)
Attack…
⚫ DDOS attack is a brute-force attempt to slow down or completely crash a
server
⚫ cut off users from a network resource by overwhelming it with requests for
service by using bot to carry out tasks simultaneously
Types of DDoS attacks🡪
1.volume based
2. Protocol based
3.application layer based
Man-in-the-Middle Attack…
⚫ These type is also called as connection hijacking
⚫ In this attack ,a malicious party intercepts a legitimate communication between two hosts to
controls the flow of communication and to eliminate of ter the info sent by one of the original
participants without their knowledge
⚫ In this way, an attacker can fool a victim into disclosing confidential information by “spoofing”
the Identity of the original sender.
Botnet…?
Robot + Network = Botnet
• Basically special types of
Trojan Viruses/Malware created
by Bot Master(Criminal)
• Used to breach the security of
several user’s Computers
• After infecting the target,
starts sending flood of request to
that network completely
shutdown the network
Anti Spoofing….?
There have some common tools available by which Spoofing can be
reduced🡪
⚫Packet Filtering
⚫Avoid Trust Relationships
⚫Use Spoofing Detection Software
⚫Use Cryptographic Network Protocols
⚫Use Firewall Protection
Advantages/Disadvantages…
⚫Advantages:
⚫ Ethical Hacking
⚫ Easy to Implement
⚫ Seamless Mobility
⚫ No need to change MAC or IP Address
⚫Disadvantages:
⚫ Ethernet does not scale
⚫ Long Path, State per MAC Address
⚫ Packets Flooding
Is IP Spoofing a Real Risk…?
⚫ The April 1989 article entitled:
“Security Problems in the TCP/IP
Protocol Suite” by S.M Bellovin
indentified that IP Spoofing is really a
risk to computer networks.
⚫ New Internet research shows 30,000
Spoofing Attacks/day
⚫ The Statistics of IP Spoofing is
increased exponentially day by day.
Conclusion…
⚫IP Spoofing is an old Hacker Trick that continues to evolve.
⚫Will continue to represent a threat as long as each layer
continues to trust each other.
IP Spoofing: Understanding the Risks and Techniques

More Related Content

What's hot

র‌্যানসমওয়্যার
র‌্যানসমওয়্যার র‌্যানসমওয়্যার
র‌্যানসমওয়্যার Titas Sarker
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataInderjeet Singh
 
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
"Preventing Loss of Personal Data on a Mobile Network", Oleksii LukinHackIT Ukraine
 
Methods of Cybersecurity Attacks
Methods of Cybersecurity AttacksMethods of Cybersecurity Attacks
Methods of Cybersecurity AttacksZyrellLalaguna
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authenticationZTech Proje
 
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde..."Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...HackIT Ukraine
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokeshLokesh Bysani
 
Ransomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionRansomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionMohammad Yahya
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyAdri Jovin
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security ApplicationsHatem Mahmoud
 

What's hot (20)

Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
র‌্যানসমওয়্যার
র‌্যানসমওয়্যার র‌্যানসমওয়্যার
র‌্যানসমওয়্যার
 
Poster - FATIN FAZAIN_KRK_FYP2
Poster - FATIN FAZAIN_KRK_FYP2Poster - FATIN FAZAIN_KRK_FYP2
Poster - FATIN FAZAIN_KRK_FYP2
 
Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
 
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
 
What is FIDO
What is FIDOWhat is FIDO
What is FIDO
 
Methods of Cybersecurity Attacks
Methods of Cybersecurity AttacksMethods of Cybersecurity Attacks
Methods of Cybersecurity Attacks
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
Ransomware
RansomwareRansomware
Ransomware
 
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde..."Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
 
45
4545
45
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
 
Ransomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionRansomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, Prevention
 
Ga13
Ga13Ga13
Ga13
 
Ransomeware
RansomewareRansomeware
Ransomeware
 
Web security
Web securityWeb security
Web security
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Similar to IP Spoofing: Understanding the Risks and Techniques

Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?TechGenie
 
342_IP_Spoofing.pptx
342_IP_Spoofing.pptx342_IP_Spoofing.pptx
342_IP_Spoofing.pptxRajeshArora97
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security Mehedi Hasan
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hackingCmano Kar
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
Computer hacking
Computer hackingComputer hacking
Computer hackingArjun Tomar
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaNew Horizons Bulgaria
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingsxkkjbzq2k
 

Similar to IP Spoofing: Understanding the Risks and Techniques (20)

Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
UNIT 5 (2).pptx
UNIT 5 (2).pptxUNIT 5 (2).pptx
UNIT 5 (2).pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
342_IP_Spoofing.pptx
342_IP_Spoofing.pptx342_IP_Spoofing.pptx
342_IP_Spoofing.pptx
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Network Security
Network SecurityNetwork Security
Network Security
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
hacking
hackinghacking
hacking
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

IP Spoofing: Understanding the Risks and Techniques

  • 1. IP SPOOFING By IPSHITA NANDY CSE,3RD YR, SEC-Y,234
  • 2. Term IP Spoofing Indicates..? ⚫ Spoofing = Hocks / Tricks/Hiding ⚫ IP Spoofing = Hiding of Internet Protocol .
  • 3. What is IP Spoofing..? ⚫ A Technique, used to gain Unauthorized access to Machines. ⚫ It involves the creation of IP packets which have a modified source address. ⚫ IP Spoofing is also called IP Address Forgery or Host File Hijack.
  • 4. Why IP Spoofing is used..? ⚫ This eliminates the need for the hacker to provide a username and password to log onto the network. ⚫ These are attacks that relate massive amounts of information being sent to computers over a network in an attempt to crash the full network. ⚫ The hacker does not get caught because the origin of the messages cannot be determined due to the bogus IP address.
  • 6. Different Types of IP Spoofing… ⚫Denial of Service Attack(DOS attacks) ⚫Distributed Denial of Service(DDOS attacks) ⚫Man in the Middle Attack ⚫Non-Blind Spoofing ⚫Blind Spoofing
  • 7. Denial-of-service(DOS) Attacks… ⚫ IP Spoofing is always used in DOS attacks. ⚫ DOS Attack is characterized by using a single computer to launch the attack ⚫ DOS attacks typically function by flooding a targeted machine with requests until normal traffic is unable to be processed, resulting in denial-of-service to addition users. Types of DOS Attacks: >> Buffer overflow >>Flood attacks
  • 8. Distributed Denial-of-Service (DDoS) Attack… ⚫ DDOS attack is a brute-force attempt to slow down or completely crash a server ⚫ cut off users from a network resource by overwhelming it with requests for service by using bot to carry out tasks simultaneously Types of DDoS attacks🡪 1.volume based 2. Protocol based 3.application layer based
  • 9. Man-in-the-Middle Attack… ⚫ These type is also called as connection hijacking ⚫ In this attack ,a malicious party intercepts a legitimate communication between two hosts to controls the flow of communication and to eliminate of ter the info sent by one of the original participants without their knowledge ⚫ In this way, an attacker can fool a victim into disclosing confidential information by “spoofing” the Identity of the original sender.
  • 10. Botnet…? Robot + Network = Botnet • Basically special types of Trojan Viruses/Malware created by Bot Master(Criminal) • Used to breach the security of several user’s Computers • After infecting the target, starts sending flood of request to that network completely shutdown the network
  • 11. Anti Spoofing….? There have some common tools available by which Spoofing can be reduced🡪 ⚫Packet Filtering ⚫Avoid Trust Relationships ⚫Use Spoofing Detection Software ⚫Use Cryptographic Network Protocols ⚫Use Firewall Protection
  • 12. Advantages/Disadvantages… ⚫Advantages: ⚫ Ethical Hacking ⚫ Easy to Implement ⚫ Seamless Mobility ⚫ No need to change MAC or IP Address ⚫Disadvantages: ⚫ Ethernet does not scale ⚫ Long Path, State per MAC Address ⚫ Packets Flooding
  • 13. Is IP Spoofing a Real Risk…? ⚫ The April 1989 article entitled: “Security Problems in the TCP/IP Protocol Suite” by S.M Bellovin indentified that IP Spoofing is really a risk to computer networks. ⚫ New Internet research shows 30,000 Spoofing Attacks/day ⚫ The Statistics of IP Spoofing is increased exponentially day by day.
  • 14. Conclusion… ⚫IP Spoofing is an old Hacker Trick that continues to evolve. ⚫Will continue to represent a threat as long as each layer continues to trust each other.