SlideShare a Scribd company logo
IP-SPOOFING




     By- Himanshu Chaurishiya
WHAT IS IP-SPOOFING ???



        IP       -> Internet Protocol..
        Spoofing -> Hiding..

   It is a trick played on servers to fool the target
computers into thinking that it is receiving data from
source other than the trusted host.

  This Attack is actually a Trust-Relationship
Exploitation.
REAL LIFE EXAMPLE TO
                                           B is on line
EXPLAIN WHAT IS
IP SPOOFING.

         A disguising his voice,making
         it sound more like that of B        C
  A
                              B

If we now,replace the 3 people by computers and change
the term “voice” with “IP-Address” then you would know
what we mean by IP-SPOOFING…
IP Packet Header
TCP Packet Header
THE 3-WAY HANDSHAKE ..


           SYN

           SYN,ACK

           ACK
CLIENT                        HOST
IP
SPOOFING
IP
SPOOFING
THE
       K
 ATTAC

1. Non-blind spoofing :

This attack takes place when the attacker is on the
same subnet as the target that could see sequence and
acknowledgement of packets.

                    SYN

   S                                         R
                    SYN,ACK


                                    ACK
                     A
2. Blind spoofing

This attack may take place from outside where sequence
and acknowledgement numbers are unreachable. Attackers
usually send several packets to the target machine in
order to figure out sequence numbers, which is easy to do
in older days. Since most OSs implement random sequence
number generation today, it becomes more difficult to
predict the sequence number accurately. If, however, the
sequence number was compromised, data could be sent to
the target.
3. Denial of Service Attack :

  IP spoofing is almost always used in denial of service
  attacks (DoS), in which attackers are concerned with
  consuming bandwidth & resources by flooding the target
  with as many packets as possible in a short amount of
  time.
4.Man in the Middle Attack

This is also called connection hijacking. In this attacks, a
malicious party intercepts a legitimate communication
between two hosts to controls the flow of communication
and to eliminate or alter the information sent by one of the
original participants without their knowledge.




   S                     A                    R
WHY IP SPOOFING IS EASY ?

•   Problem with the Routers.
•   Routers look at Destination addresses only.
•   Authentication based on Source addresses only.
•   To change source address field in IP header field is
    easy.
IO N
   E CT
DET

 Routing Methods

 • Ingress filtering
 • Egress filtering

 Non-Routing Methods

 • IP Identification Number
 • Flow Control
 • Packet Retransmission
 •Traceroute
Routing Method
Routers know IP addresses originate with which
network interface. If the router receives IP
Packets with external IP addresses on an internal
interface or vice versa its likely to be spoofed.

Filtering:

•Ingress filtering(inbound packets)-protect
org.from outside attacks.

•Egress filtering(outbound packets)-prevent
internal computers from being involved in Spoofing
Attack
Non-Routing


Active- verify that the packet was sent from
claimed source, Method validate case.

Passive- no such action, indicate packet was
spoofed.
Identification Number(ID)
   Detect IP Spoofed Packet,when attacker is on same
   Subnet as Target.
                            R
     S                          Detection as follows:
         Sen
             d   Pa c k
                       et
                                •ID value should be near the
                                Questionable packets.

                                •ID value must be greater
ID                              than the ID value in
values                          Questionable Packet.

                                •If its Spoofed there value
                                change rapidly.
Flow Control
S                R     • If the Packets = Spoofed,then
                       Sender =no recipient’s ACK
                       Packets,will not respond to flow
    AC                 control.
       K

                       •If the Recipient’s =no ACK
           ACK         Packets,Sender Should Stop After
                       the initial window size is exhausted.
 W.s.
     =
(exc I
    eed)
Contd..
    S                  R
          ACK              Another Way to Detect IP
                           Spoofing.

                 w=0       •We set W=0 ,in order to know
            ,ACK           Sender is receiving or not.
        SYN
                           •If W=0,and we get ACK with
          ACK              some Data ,it means it’s likely to
                           be Spoofed.
Packet Retransmission
S           R
    ACK         TCP uses sequence number to
                determine which Packets have been
    ReSYN       ACK.
                Method to Detect:
                •When Packet Receive with an ACK-
                number less then min expected,or
                greater than max expected,the
    ACK         Packet Drops and as a way to resyn.
                The connection,send a reply with min
                expected Ack-number is sent.
    RST         •After receiving ACK successfully
                next time sent RST in reply ,its
                spoofed.
Contd..
 FIREWALL

 Capture reply, and Prevent the internal host from
 seeing the reply ,and will Prevent an ACK-Storm .
Traceroute
   Traceroute tells number of
   hops to the true source.

   Detection is as follows

   •If the Firewall blocks UDP
   packets it will count the Hops
   to the firewall.

   •If the packet is spoofed the
   number of Hops increase.
   (monitored site more hops
   away than true ).
Backdoor
t iv e
    ve n e s
 Pre sur
  M ea


1.Packet Filtering

2.Firewall

3.Disable commands like Ping.

4.Encryption
Should arriving
                              packet be allowed
                            in? Departing packet
                                  let out?




internal network connected to Internet

Router filter packets-by-packets, decision to
forward/drop packets based on:
  --Source IP address, destination IP address.
  --TCP SYN and ACK bits.
Oh sure, Don’t
Our network   worry. We have
 is secure,       several
   right?        firewalls
CONCLUSION
IP-Spoofing is an exploitation of trust-based
relationship and can be curbed effectively if
proper measures are used. Understanding
how and why spoofing attacks are used
,combined with a few simple prevention
methods, can help protect networks from
these    malicious  cloaking   and    cracking
techniques.
Any
Queries?
THANK YOU !

More Related Content

What's hot

Denail of Service
Denail of ServiceDenail of Service
Denail of Service
Ramasubbu .P
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
Kaustubh Padwad
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
Jignesh Patel
 
SQL INJECTION
SQL INJECTIONSQL INJECTION
SQL INJECTION
Anoop T
 
DDoS - Distributed Denial of Service
DDoS - Distributed Denial of ServiceDDoS - Distributed Denial of Service
DDoS - Distributed Denial of Service
Er. Shiva K. Shrestha
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
Ahmed Ghazey
 
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacks
Haltdos
 
My ppt..priya
My ppt..priyaMy ppt..priya
My ppt..priya
priya_kp03
 
Presentation1
Presentation1Presentation1
Presentation1
Rahul Polara
 
Socket Programming
Socket ProgrammingSocket Programming
Socket Programming
CEC Landran
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
Anil Antony
 
Denial of Service Attack Project
Denial of Service Attack ProjectDenial of Service Attack Project
Denial of Service Attack Project
Nadim Ebadi
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
Dhrumil Shah
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
Sanguine_Eva
 
Spoofing
SpoofingSpoofing
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
Hansa Nidushan
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
shindept123
 
Ddos attacks
Ddos attacksDdos attacks
Ddos attacks
communication-eg
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
Thushara92
 
Firewalls
FirewallsFirewalls
Firewalls
Kalluri Madhuri
 

What's hot (20)

Denail of Service
Denail of ServiceDenail of Service
Denail of Service
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
SQL INJECTION
SQL INJECTIONSQL INJECTION
SQL INJECTION
 
DDoS - Distributed Denial of Service
DDoS - Distributed Denial of ServiceDDoS - Distributed Denial of Service
DDoS - Distributed Denial of Service
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacks
 
My ppt..priya
My ppt..priyaMy ppt..priya
My ppt..priya
 
Presentation1
Presentation1Presentation1
Presentation1
 
Socket Programming
Socket ProgrammingSocket Programming
Socket Programming
 
DDoS ATTACKS
DDoS ATTACKSDDoS ATTACKS
DDoS ATTACKS
 
Denial of Service Attack Project
Denial of Service Attack ProjectDenial of Service Attack Project
Denial of Service Attack Project
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
Spoofing
SpoofingSpoofing
Spoofing
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Ddos attacks
Ddos attacksDdos attacks
Ddos attacks
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Firewalls
FirewallsFirewalls
Firewalls
 

Viewers also liked

Ip spoofing (seminar report)
Ip spoofing (seminar report)Ip spoofing (seminar report)
Ip spoofing (seminar report)Rahul Polara
 
ip spoofing
ip spoofingip spoofing
ip spoofing
vipin soni
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
Raza_Abidi
 
Ip spoofing attacks
Ip spoofing attacksIp spoofing attacks
Ip spoofing attacks
Apijay Kumar
 
Spoofing
SpoofingSpoofing
Spoofing
Sanjeev
 
Security problems in TCP/IP
Security problems in TCP/IPSecurity problems in TCP/IP
Security problems in TCP/IP
Sukh Sandhu
 
Spoofing Attacks حملات جعل هویت
Spoofing Attacks حملات جعل هویت Spoofing Attacks حملات جعل هویت
Spoofing Attacks حملات جعل هویت
Muhibullah Aman
 
IP spoofing attacks & defence
IP spoofing attacks & defenceIP spoofing attacks & defence
IP spoofing attacks & defence
visor999
 
BasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet FiltersBasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet Filters
bhasker nalaveli
 
Tcp
TcpTcp
Tcp
giaolvq
 
A Novel IP Traceback Scheme for Spoofing Attack
A Novel IP Traceback Scheme for Spoofing AttackA Novel IP Traceback Scheme for Spoofing Attack
A Novel IP Traceback Scheme for Spoofing Attack
IJAEMSJORNAL
 
Spoofing
SpoofingSpoofing
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
Michael Lamont
 
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacksKipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky
 
TCP/IP
TCP/IPTCP/IP
Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention
International Journal of Science and Research (IJSR)
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
SMC Networks Europe
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
marwan aldulaimy
 
FEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionFEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP Introduction
Kae Hsu
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 

Viewers also liked (20)

Ip spoofing (seminar report)
Ip spoofing (seminar report)Ip spoofing (seminar report)
Ip spoofing (seminar report)
 
ip spoofing
ip spoofingip spoofing
ip spoofing
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
Ip spoofing attacks
Ip spoofing attacksIp spoofing attacks
Ip spoofing attacks
 
Spoofing
SpoofingSpoofing
Spoofing
 
Security problems in TCP/IP
Security problems in TCP/IPSecurity problems in TCP/IP
Security problems in TCP/IP
 
Spoofing Attacks حملات جعل هویت
Spoofing Attacks حملات جعل هویت Spoofing Attacks حملات جعل هویت
Spoofing Attacks حملات جعل هویت
 
IP spoofing attacks & defence
IP spoofing attacks & defenceIP spoofing attacks & defence
IP spoofing attacks & defence
 
BasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet FiltersBasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet Filters
 
Tcp
TcpTcp
Tcp
 
A Novel IP Traceback Scheme for Spoofing Attack
A Novel IP Traceback Scheme for Spoofing AttackA Novel IP Traceback Scheme for Spoofing Attack
A Novel IP Traceback Scheme for Spoofing Attack
 
Spoofing
SpoofingSpoofing
Spoofing
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacksKipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
 
FEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionFEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP Introduction
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 

Similar to Himanshupptx

Ip spoofing & types of attachs using it
Ip spoofing & types of attachs using itIp spoofing & types of attachs using it
Ip spoofing & types of attachs using it
Rajesh Porwal
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
guestd05b31
 
spoofing.ppt
spoofing.pptspoofing.ppt
spoofing.ppt
Uzma443495
 
Hacking Cisco Networks and Countermeasures
Hacking Cisco Networks and CountermeasuresHacking Cisco Networks and Countermeasures
Hacking Cisco Networks and Countermeasures
dkaya
 
Network security
Network securityNetwork security
Network security
syed mehdi raza
 
26 security2
26 security226 security2
26 security2
congiodiqua
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
Vinil Patel
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
vulnerabilities in IP.pdf
vulnerabilities in IP.pdfvulnerabilities in IP.pdf
vulnerabilities in IP.pdf
MuhammadSufyanAbbasi1
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)
Mumbai Academisc
 
Asegúr@IT 7: Playing with Satellites 1.2
Asegúr@IT 7: Playing with Satellites 1.2Asegúr@IT 7: Playing with Satellites 1.2
Asegúr@IT 7: Playing with Satellites 1.2
Chema Alonso
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
Roushan Jha
 
Security attacks
Security attacksSecurity attacks
Security attacks
Tejaswi Potluri
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LAN
Arpit Suthar
 
26-security2.ppt
26-security2.ppt26-security2.ppt
26-security2.ppt
sumita02
 
26-security2.ppt
26-security2.ppt26-security2.ppt
26-security2.ppt
jepoy808
 
26-security2.ppt
26-security2.ppt26-security2.ppt
26-security2.ppt
anakorang28
 
Detection and analysis_of_syn_flood_ddos
Detection and analysis_of_syn_flood_ddosDetection and analysis_of_syn_flood_ddos
Detection and analysis_of_syn_flood_ddos
Oleh Stupak
 
Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANs
Ishraq Al Fataftah
 
Vulnerabilities in IP Protocols
Vulnerabilities in IP ProtocolsVulnerabilities in IP Protocols
Vulnerabilities in IP Protocols
babak danyal
 

Similar to Himanshupptx (20)

Ip spoofing & types of attachs using it
Ip spoofing & types of attachs using itIp spoofing & types of attachs using it
Ip spoofing & types of attachs using it
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
spoofing.ppt
spoofing.pptspoofing.ppt
spoofing.ppt
 
Hacking Cisco Networks and Countermeasures
Hacking Cisco Networks and CountermeasuresHacking Cisco Networks and Countermeasures
Hacking Cisco Networks and Countermeasures
 
Network security
Network securityNetwork security
Network security
 
26 security2
26 security226 security2
26 security2
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
vulnerabilities in IP.pdf
vulnerabilities in IP.pdfvulnerabilities in IP.pdf
vulnerabilities in IP.pdf
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)
 
Asegúr@IT 7: Playing with Satellites 1.2
Asegúr@IT 7: Playing with Satellites 1.2Asegúr@IT 7: Playing with Satellites 1.2
Asegúr@IT 7: Playing with Satellites 1.2
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Security attacks
Security attacksSecurity attacks
Security attacks
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LAN
 
26-security2.ppt
26-security2.ppt26-security2.ppt
26-security2.ppt
 
26-security2.ppt
26-security2.ppt26-security2.ppt
26-security2.ppt
 
26-security2.ppt
26-security2.ppt26-security2.ppt
26-security2.ppt
 
Detection and analysis_of_syn_flood_ddos
Detection and analysis_of_syn_flood_ddosDetection and analysis_of_syn_flood_ddos
Detection and analysis_of_syn_flood_ddos
 
Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANs
 
Vulnerabilities in IP Protocols
Vulnerabilities in IP ProtocolsVulnerabilities in IP Protocols
Vulnerabilities in IP Protocols
 

More from Himanshu Chaurishiya

Experiment1
Experiment1Experiment1
Web3
Web3Web3
909ab45j890
909ab45j890909ab45j890
Ppt it act
Ppt it actPpt it act
ONLINE COMPLAINT MANAGEMENT SYSTEM
ONLINE COMPLAINT MANAGEMENT SYSTEMONLINE COMPLAINT MANAGEMENT SYSTEM
ONLINE COMPLAINT MANAGEMENT SYSTEM
Himanshu Chaurishiya
 

More from Himanshu Chaurishiya (6)

Ror
RorRor
Ror
 
Experiment1
Experiment1Experiment1
Experiment1
 
Web3
Web3Web3
Web3
 
909ab45j890
909ab45j890909ab45j890
909ab45j890
 
Ppt it act
Ppt it actPpt it act
Ppt it act
 
ONLINE COMPLAINT MANAGEMENT SYSTEM
ONLINE COMPLAINT MANAGEMENT SYSTEMONLINE COMPLAINT MANAGEMENT SYSTEM
ONLINE COMPLAINT MANAGEMENT SYSTEM
 

Recently uploaded

RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 

Recently uploaded (20)

RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 

Himanshupptx

  • 1. IP-SPOOFING By- Himanshu Chaurishiya
  • 2. WHAT IS IP-SPOOFING ??? IP -> Internet Protocol.. Spoofing -> Hiding.. It is a trick played on servers to fool the target computers into thinking that it is receiving data from source other than the trusted host. This Attack is actually a Trust-Relationship Exploitation.
  • 3. REAL LIFE EXAMPLE TO B is on line EXPLAIN WHAT IS IP SPOOFING. A disguising his voice,making it sound more like that of B C A B If we now,replace the 3 people by computers and change the term “voice” with “IP-Address” then you would know what we mean by IP-SPOOFING…
  • 6. THE 3-WAY HANDSHAKE .. SYN SYN,ACK ACK CLIENT HOST
  • 9. THE K ATTAC 1. Non-blind spoofing : This attack takes place when the attacker is on the same subnet as the target that could see sequence and acknowledgement of packets. SYN S R SYN,ACK ACK A
  • 10. 2. Blind spoofing This attack may take place from outside where sequence and acknowledgement numbers are unreachable. Attackers usually send several packets to the target machine in order to figure out sequence numbers, which is easy to do in older days. Since most OSs implement random sequence number generation today, it becomes more difficult to predict the sequence number accurately. If, however, the sequence number was compromised, data could be sent to the target.
  • 11. 3. Denial of Service Attack : IP spoofing is almost always used in denial of service attacks (DoS), in which attackers are concerned with consuming bandwidth & resources by flooding the target with as many packets as possible in a short amount of time.
  • 12. 4.Man in the Middle Attack This is also called connection hijacking. In this attacks, a malicious party intercepts a legitimate communication between two hosts to controls the flow of communication and to eliminate or alter the information sent by one of the original participants without their knowledge. S A R
  • 13. WHY IP SPOOFING IS EASY ? • Problem with the Routers. • Routers look at Destination addresses only. • Authentication based on Source addresses only. • To change source address field in IP header field is easy.
  • 14. IO N E CT DET Routing Methods • Ingress filtering • Egress filtering Non-Routing Methods • IP Identification Number • Flow Control • Packet Retransmission •Traceroute
  • 15. Routing Method Routers know IP addresses originate with which network interface. If the router receives IP Packets with external IP addresses on an internal interface or vice versa its likely to be spoofed. Filtering: •Ingress filtering(inbound packets)-protect org.from outside attacks. •Egress filtering(outbound packets)-prevent internal computers from being involved in Spoofing Attack
  • 16. Non-Routing Active- verify that the packet was sent from claimed source, Method validate case. Passive- no such action, indicate packet was spoofed.
  • 17. Identification Number(ID) Detect IP Spoofed Packet,when attacker is on same Subnet as Target. R S Detection as follows: Sen d Pa c k et •ID value should be near the Questionable packets. •ID value must be greater ID than the ID value in values Questionable Packet. •If its Spoofed there value change rapidly.
  • 18. Flow Control S R • If the Packets = Spoofed,then Sender =no recipient’s ACK Packets,will not respond to flow AC control. K •If the Recipient’s =no ACK ACK Packets,Sender Should Stop After the initial window size is exhausted. W.s. = (exc I eed)
  • 19. Contd.. S R ACK Another Way to Detect IP Spoofing. w=0 •We set W=0 ,in order to know ,ACK Sender is receiving or not. SYN •If W=0,and we get ACK with ACK some Data ,it means it’s likely to be Spoofed.
  • 20. Packet Retransmission S R ACK TCP uses sequence number to determine which Packets have been ReSYN ACK. Method to Detect: •When Packet Receive with an ACK- number less then min expected,or greater than max expected,the ACK Packet Drops and as a way to resyn. The connection,send a reply with min expected Ack-number is sent. RST •After receiving ACK successfully next time sent RST in reply ,its spoofed.
  • 21. Contd.. FIREWALL Capture reply, and Prevent the internal host from seeing the reply ,and will Prevent an ACK-Storm .
  • 22. Traceroute Traceroute tells number of hops to the true source. Detection is as follows •If the Firewall blocks UDP packets it will count the Hops to the firewall. •If the packet is spoofed the number of Hops increase. (monitored site more hops away than true ).
  • 24. t iv e ve n e s Pre sur M ea 1.Packet Filtering 2.Firewall 3.Disable commands like Ping. 4.Encryption
  • 25. Should arriving packet be allowed in? Departing packet let out? internal network connected to Internet Router filter packets-by-packets, decision to forward/drop packets based on: --Source IP address, destination IP address. --TCP SYN and ACK bits.
  • 26. Oh sure, Don’t Our network worry. We have is secure, several right? firewalls
  • 27. CONCLUSION IP-Spoofing is an exploitation of trust-based relationship and can be curbed effectively if proper measures are used. Understanding how and why spoofing attacks are used ,combined with a few simple prevention methods, can help protect networks from these malicious cloaking and cracking techniques.