2. Content
1.Introduction.
2.What is ip spoofing.
3.What is ip address spoofing.
4.Types of ip spoofing.
5.How ip spoofing works.
6.How to detect ip spoofing.
7. how to protect against spoofing.
3. Introduction
➔ IP (Internet Protocol) spoofing is a technique used in computer
networking to disguise the true source of network traffic by altering
the source IP address of a packet.
➔ It is a situation in which one person or program successfully
masquerades as another by falsifying information/data and thereby
gaining an illegitimate advantage.
4. Introduction
➔ This technique can be used to launch various types of cyber attacks,
such as denial-of-service (dos) attacks, man-in-the-middle (mitm)
attacks, and session hijacking attacks.
➔ This can be done using various tools and techniques, such as
specialized software, scripting languages, or by manually crafting
packets using low-level network programming.
5. ❖ Spoofing is a type of cybercrime, the method of which is to impersonate another
computer or network as a normal user in order to convince the user about the
credibility of the source of information.
❖ Hackers use this method as a form of hacking an operating system to steal
sensitive data, misuse captured computers, launch attacks, and more. In fact,
IP spoofing was originally one of the methods of DDoS attacks.
7. Types of IP Spoofing?
● IP spoofing: Attacker uses IP address of
another computer to acquire
information or gain access from
another network.
● Email spoofing: Attacker sends email but
makes it appear to come from someone
else(reliable email).
● Web spoofing: Attacker tricks web browser
into communicating with a
9. ● Any attack works according to some scheme,
which it develops its identical structure of
actions. For example, above, we consider the IP
spoofing algorithm:
● All data that is transmitted between computer
networks is divided into packets. Does each
package have its IP headers, which include the
source IP address and other information.
How IP Spoofing Works ?
10. ● What’s a cybercriminal doing with all this? It
starts to change the IP addresses it compiles so
that the recipient will think the sending is coming
from a reliable source.
● These operations take place on a network level,
so there are no signs on the surface. The spoofing
process falsifies the sender’s address to convince
the remote system that it receives the address
from an objective source.
How IP Spoofing Works ?
12. 1. It is almost impossible to notice a submenu IP address because the submenu
occurs on a network level and connections often look like legitimate requests.
So there are no external signs.
2. But not all are unsuccessful! Network monitoring tools make it possible to do
traffic analysis at endpoints.
3. It would also be appropriate for such attacks to do packet filtering; what would it
do? These package systems located in the firewall and routers find a discrepancy
between the required IP address and the IP addresses of the packets specified in the
ACL (access control list), so it is possible to find an attacker on the network.
How To Detect IP Spoofing ?
14. How to Prevent Against IP Spoofing ?
● Turn your spam filter.
● Check for poor grammar.
● Hover over the URL before clicking.
● Confirm information with the source.
● Set up two-factor authentication.
● Download cyber-security software.
.
● Click on unfamiliar download
● Answer call or email from
unrecognized sender
● Give out your personal information to
unfamiliar source
● Use the same password across
multiple logins