SlideShare a Scribd company logo
Made By:
Dhrumil Shah
TYBBA Div 1
Roll No. 38
WHAT IS IP SPOOFING?
In computer networking, IP address spoofing or IP
spoofing is the creation of Internet Protocol (IP)
packets with a forged source IP address, with the
purpose of concealing the identity of the sender or
impersonating another computing system.
HOW IS IT DONE?
† In IP spoofing, an attacker gains unauthorized access to
a computer or a network by making it appear that a
malicious message has come from a trusted machine by
“spoofing” the IP address of that machine.
† To be successful, the intruder must first determine the
IP address of a trusted system, and then modify the
packet headers to that it appears that the packets are
coming from the trusted system.
SERVICES VULNERABLE TO IP SPOOFING
Configuration and services those are vulnerable to IP
spoofing:
† RPC (Remote procedure call services)
† Any service that uses IP address authentication
† The X Window System
† The R services suite (rlogin, rsh, etc.)
TYPES OF IP SPOOFING
† Blind Spoofing
† Non-Blind Spoofing
† Denial of Service attack
† Man in the middle attack
WHY IP SPOOFING?
† The sender has some kind of malicious intention and does
not want to be identified.
† You can use the source address in the header of an IP
datagram to trace the sender's location.
† Most systems keep logs of Internet activity, so if
attackers want to hide their identity, they need to
change the source address.
† The host receiving the spoofed packet responds to the
spoofed address, so the attacker receives no reply back
from the victim host.
COUNTER MEASURES
† Packet filtering
† Limits of packet filtering
† Filtering at the router
† Disable commands

More Related Content

What's hot

Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
arpit.arp
 
Spoofing
SpoofingSpoofing
Ip spoofing & types of attachs using it
Ip spoofing & types of attachs using itIp spoofing & types of attachs using it
Ip spoofing & types of attachs using it
Rajesh Porwal
 
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many otherSpoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Pankaj Dubey
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
Akmal Hussain
 
Spoofing
SpoofingSpoofing
SpoofingSanjeev
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
sonangrai
 
Man in the middle
Man in the middleMan in the middle
Man in the middle
AhmadThaqifAimanAhma
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
Anushakp9
 
Himanshupptx
HimanshupptxHimanshupptx
Himanshupptx
Himanshu Chaurishiya
 
Ping-and-Traceroute.ppt
Ping-and-Traceroute.pptPing-and-Traceroute.ppt
Ping-and-Traceroute.ppt
MathewSanJuan
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
vdgtkhdh
 
Proxy servers
Proxy serversProxy servers
Proxy serversKumar
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
APNIC
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
AmanuelZewdie4
 
network essential ppt
network essential pptnetwork essential ppt
network essential pptVikas Tiwari
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
Deepak Upadhyay
 
Phishing
PhishingPhishing
Phishing
anjalika sinha
 
Network security
Network securityNetwork security
Network security
quest university nawabshah
 

What's hot (20)

Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Spoofing
SpoofingSpoofing
Spoofing
 
Ip spoofing & types of attachs using it
Ip spoofing & types of attachs using itIp spoofing & types of attachs using it
Ip spoofing & types of attachs using it
 
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many otherSpoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 
Spoofing
SpoofingSpoofing
Spoofing
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Man in the middle
Man in the middleMan in the middle
Man in the middle
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
Himanshupptx
HimanshupptxHimanshupptx
Himanshupptx
 
Ping-and-Traceroute.ppt
Ping-and-Traceroute.pptPing-and-Traceroute.ppt
Ping-and-Traceroute.ppt
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Proxy servers
Proxy serversProxy servers
Proxy servers
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Teaching Your Staff About Phishing
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
 
network essential ppt
network essential pptnetwork essential ppt
network essential ppt
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
Phishing
PhishingPhishing
Phishing
 
Network security
Network securityNetwork security
Network security
 

Viewers also liked

Ip spoofing (seminar report)
Ip spoofing (seminar report)Ip spoofing (seminar report)
Ip spoofing (seminar report)Rahul Polara
 
Spoofing
SpoofingSpoofing
Spoofing
kobegarcia
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
3washyy
 
Security problems in TCP/IP
Security problems in TCP/IPSecurity problems in TCP/IP
Security problems in TCP/IP
Sukh Sandhu
 
BasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet FiltersBasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet Filtersbhasker nalaveli
 
IP spoofing attacks & defence
IP spoofing attacks & defenceIP spoofing attacks & defence
IP spoofing attacks & defencevisor999
 
Spoofing Attacks حملات جعل هویت
Spoofing Attacks حملات جعل هویت Spoofing Attacks حملات جعل هویت
Spoofing Attacks حملات جعل هویت
Muhibullah Aman
 
A Novel IP Traceback Scheme for Spoofing Attack
A Novel IP Traceback Scheme for Spoofing AttackA Novel IP Traceback Scheme for Spoofing Attack
A Novel IP Traceback Scheme for Spoofing Attack
IJAEMSJORNAL
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
Michael Lamont
 
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacksKipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky
 
TCP/IP
TCP/IPTCP/IP
Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention
International Journal of Science and Research (IJSR)
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
SMC Networks Europe
 
Objective-C
Objective-CObjective-C
Objective-C
Giuseppe Arici
 
Objective c slide I
Objective c slide IObjective c slide I
Objective c slide I
Diksha Bhargava
 

Viewers also liked (19)

ip spoofing
ip spoofingip spoofing
ip spoofing
 
Ip spoofing (seminar report)
Ip spoofing (seminar report)Ip spoofing (seminar report)
Ip spoofing (seminar report)
 
Spoofing
SpoofingSpoofing
Spoofing
 
Isys20261 lecture 07
Isys20261 lecture 07Isys20261 lecture 07
Isys20261 lecture 07
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Web spoofing
Web spoofingWeb spoofing
Web spoofing
 
Security problems in TCP/IP
Security problems in TCP/IPSecurity problems in TCP/IP
Security problems in TCP/IP
 
BasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet FiltersBasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet Filters
 
IP spoofing attacks & defence
IP spoofing attacks & defenceIP spoofing attacks & defence
IP spoofing attacks & defence
 
Spoofing Attacks حملات جعل هویت
Spoofing Attacks حملات جعل هویت Spoofing Attacks حملات جعل هویت
Spoofing Attacks حملات جعل هویت
 
Tcp
TcpTcp
Tcp
 
A Novel IP Traceback Scheme for Spoofing Attack
A Novel IP Traceback Scheme for Spoofing AttackA Novel IP Traceback Scheme for Spoofing Attack
A Novel IP Traceback Scheme for Spoofing Attack
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacksKipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Objective-C
Objective-CObjective-C
Objective-C
 
Objective c slide I
Objective c slide IObjective c slide I
Objective c slide I
 

Similar to Ip Spoofing

342_IP_Spoofing.pptx
342_IP_Spoofing.pptx342_IP_Spoofing.pptx
342_IP_Spoofing.pptx
RajeshArora97
 
spoofing.ppt
spoofing.pptspoofing.ppt
spoofing.ppt
Uzma443495
 
Sudheer tech seminor
Sudheer tech seminorSudheer tech seminor
Sudheer tech seminor
charankumarreddy muddarla
 
Ip addressing comp
Ip addressing compIp addressing comp
Ip addressing comp
safi Ullah
 
poofing.ppt jrjejjhhhhhhhhhhthfjrjejejejejdjdj
poofing.ppt jrjejjhhhhhhhhhhthfjrjejejejejdjdjpoofing.ppt jrjejjhhhhhhhhhhthfjrjejejejejdjdj
poofing.ppt jrjejjhhhhhhhhhhthfjrjejejejejdjdj
Ajithsuresh12
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2
Anne Starr
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2
Anne Starr
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2
Anne Starr
 
Hacking Cisco Networks and Countermeasures
Hacking Cisco Networks and CountermeasuresHacking Cisco Networks and Countermeasures
Hacking Cisco Networks and Countermeasuresdkaya
 
Ip address
Ip addressIp address
Ip address
Prem Sahu
 
31.ppt
31.ppt31.ppt
31.ppt
31.ppt31.ppt
31.ppt
KarmanChandi
 
Hidden ip does not allow hackers to identify your location
Hidden ip does not allow hackers to identify your locationHidden ip does not allow hackers to identify your location
Hidden ip does not allow hackers to identify your location
Proxies Rent
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hackingjignesh khunt
 
ip spoofing by Ipshita Nandy
 ip spoofing by Ipshita Nandy ip spoofing by Ipshita Nandy
ip spoofing by Ipshita Nandy
IpshitaNandy
 
Topic22
Topic22Topic22
Topic22
Anne Starr
 

Similar to Ip Spoofing (20)

342_IP_Spoofing.pptx
342_IP_Spoofing.pptx342_IP_Spoofing.pptx
342_IP_Spoofing.pptx
 
spoofing.ppt
spoofing.pptspoofing.ppt
spoofing.ppt
 
Sudheer tech seminor
Sudheer tech seminorSudheer tech seminor
Sudheer tech seminor
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Ip addressing comp
Ip addressing compIp addressing comp
Ip addressing comp
 
poofing.ppt jrjejjhhhhhhhhhhthfjrjejejejejdjdj
poofing.ppt jrjejjhhhhhhhhhhthfjrjejejejejdjdjpoofing.ppt jrjejjhhhhhhhhhhthfjrjejejejejdjdj
poofing.ppt jrjejjhhhhhhhhhhthfjrjejejejejdjdj
 
Infosec
InfosecInfosec
Infosec
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2
 
Hacking Cisco Networks and Countermeasures
Hacking Cisco Networks and CountermeasuresHacking Cisco Networks and Countermeasures
Hacking Cisco Networks and Countermeasures
 
Ip address
Ip addressIp address
Ip address
 
Hacking
HackingHacking
Hacking
 
31.ppt
31.ppt31.ppt
31.ppt
 
31.ppt
31.ppt31.ppt
31.ppt
 
Hidden ip does not allow hackers to identify your location
Hidden ip does not allow hackers to identify your locationHidden ip does not allow hackers to identify your location
Hidden ip does not allow hackers to identify your location
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hacking
 
ip spoofing by Ipshita Nandy
 ip spoofing by Ipshita Nandy ip spoofing by Ipshita Nandy
ip spoofing by Ipshita Nandy
 
Topic22
Topic22Topic22
Topic22
 

More from Dhrumil Shah

Marketing of mobiles
Marketing of mobilesMarketing of mobiles
Marketing of mobiles
Dhrumil Shah
 
Comparison of Financial Statements
Comparison of Financial StatementsComparison of Financial Statements
Comparison of Financial Statements
Dhrumil Shah
 
Meaning & Reasons, Calculation of Merger Effects
Meaning & Reasons, Calculation of Merger EffectsMeaning & Reasons, Calculation of Merger Effects
Meaning & Reasons, Calculation of Merger Effects
Dhrumil Shah
 
Successful project implementation requires, detailed project planning
Successful project implementation requires, detailed project planningSuccessful project implementation requires, detailed project planning
Successful project implementation requires, detailed project planning
Dhrumil Shah
 
Three leaders and three teachers from bhagavad gita
Three leaders and three teachers  from bhagavad gitaThree leaders and three teachers  from bhagavad gita
Three leaders and three teachers from bhagavad gita
Dhrumil Shah
 
Introduction and significance of personal finance
Introduction and significance of personal financeIntroduction and significance of personal finance
Introduction and significance of personal finance
Dhrumil Shah
 
Organizational Characteristics
Organizational CharacteristicsOrganizational Characteristics
Organizational Characteristics
Dhrumil Shah
 
Analyzing solvency of companies
Analyzing solvency of companiesAnalyzing solvency of companies
Analyzing solvency of companies
Dhrumil Shah
 
Customs Duty
Customs DutyCustoms Duty
Customs Duty
Dhrumil Shah
 
Smart automobiles
Smart automobilesSmart automobiles
Smart automobiles
Dhrumil Shah
 
Principles to Develop Good Internal Check System
Principles to Develop Good Internal Check SystemPrinciples to Develop Good Internal Check System
Principles to Develop Good Internal Check System
Dhrumil Shah
 
Procrastination
ProcrastinationProcrastination
Procrastination
Dhrumil Shah
 
Pros & Cons of International Business
Pros & Cons of International BusinessPros & Cons of International Business
Pros & Cons of International Business
Dhrumil Shah
 
Securities and Exchange Board of India
Securities and Exchange Board of IndiaSecurities and Exchange Board of India
Securities and Exchange Board of India
Dhrumil Shah
 
Social impact of Entrepreneurship
Social impact of EntrepreneurshipSocial impact of Entrepreneurship
Social impact of Entrepreneurship
Dhrumil Shah
 
Meaning of Capital Asset, Types of Capital Assets and Meaning of Transfer & C...
Meaning of Capital Asset, Types of Capital Assets and Meaning of Transfer & C...Meaning of Capital Asset, Types of Capital Assets and Meaning of Transfer & C...
Meaning of Capital Asset, Types of Capital Assets and Meaning of Transfer & C...
Dhrumil Shah
 
Types of sampling
Types of samplingTypes of sampling
Types of sampling
Dhrumil Shah
 
Role of Private Companies in Insurance
Role of Private Companies in InsuranceRole of Private Companies in Insurance
Role of Private Companies in Insurance
Dhrumil Shah
 
Global Overview & Prospects of Retailing in India
Global Overview & Prospects of Retailing in IndiaGlobal Overview & Prospects of Retailing in India
Global Overview & Prospects of Retailing in India
Dhrumil Shah
 
Product & Process Layouts
Product & Process LayoutsProduct & Process Layouts
Product & Process Layouts
Dhrumil Shah
 

More from Dhrumil Shah (20)

Marketing of mobiles
Marketing of mobilesMarketing of mobiles
Marketing of mobiles
 
Comparison of Financial Statements
Comparison of Financial StatementsComparison of Financial Statements
Comparison of Financial Statements
 
Meaning & Reasons, Calculation of Merger Effects
Meaning & Reasons, Calculation of Merger EffectsMeaning & Reasons, Calculation of Merger Effects
Meaning & Reasons, Calculation of Merger Effects
 
Successful project implementation requires, detailed project planning
Successful project implementation requires, detailed project planningSuccessful project implementation requires, detailed project planning
Successful project implementation requires, detailed project planning
 
Three leaders and three teachers from bhagavad gita
Three leaders and three teachers  from bhagavad gitaThree leaders and three teachers  from bhagavad gita
Three leaders and three teachers from bhagavad gita
 
Introduction and significance of personal finance
Introduction and significance of personal financeIntroduction and significance of personal finance
Introduction and significance of personal finance
 
Organizational Characteristics
Organizational CharacteristicsOrganizational Characteristics
Organizational Characteristics
 
Analyzing solvency of companies
Analyzing solvency of companiesAnalyzing solvency of companies
Analyzing solvency of companies
 
Customs Duty
Customs DutyCustoms Duty
Customs Duty
 
Smart automobiles
Smart automobilesSmart automobiles
Smart automobiles
 
Principles to Develop Good Internal Check System
Principles to Develop Good Internal Check SystemPrinciples to Develop Good Internal Check System
Principles to Develop Good Internal Check System
 
Procrastination
ProcrastinationProcrastination
Procrastination
 
Pros & Cons of International Business
Pros & Cons of International BusinessPros & Cons of International Business
Pros & Cons of International Business
 
Securities and Exchange Board of India
Securities and Exchange Board of IndiaSecurities and Exchange Board of India
Securities and Exchange Board of India
 
Social impact of Entrepreneurship
Social impact of EntrepreneurshipSocial impact of Entrepreneurship
Social impact of Entrepreneurship
 
Meaning of Capital Asset, Types of Capital Assets and Meaning of Transfer & C...
Meaning of Capital Asset, Types of Capital Assets and Meaning of Transfer & C...Meaning of Capital Asset, Types of Capital Assets and Meaning of Transfer & C...
Meaning of Capital Asset, Types of Capital Assets and Meaning of Transfer & C...
 
Types of sampling
Types of samplingTypes of sampling
Types of sampling
 
Role of Private Companies in Insurance
Role of Private Companies in InsuranceRole of Private Companies in Insurance
Role of Private Companies in Insurance
 
Global Overview & Prospects of Retailing in India
Global Overview & Prospects of Retailing in IndiaGlobal Overview & Prospects of Retailing in India
Global Overview & Prospects of Retailing in India
 
Product & Process Layouts
Product & Process LayoutsProduct & Process Layouts
Product & Process Layouts
 

Recently uploaded

guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 

Recently uploaded (20)

guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 

Ip Spoofing

  • 1. Made By: Dhrumil Shah TYBBA Div 1 Roll No. 38
  • 2. WHAT IS IP SPOOFING? In computer networking, IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a forged source IP address, with the purpose of concealing the identity of the sender or impersonating another computing system.
  • 3. HOW IS IT DONE? † In IP spoofing, an attacker gains unauthorized access to a computer or a network by making it appear that a malicious message has come from a trusted machine by “spoofing” the IP address of that machine. † To be successful, the intruder must first determine the IP address of a trusted system, and then modify the packet headers to that it appears that the packets are coming from the trusted system.
  • 4. SERVICES VULNERABLE TO IP SPOOFING Configuration and services those are vulnerable to IP spoofing: † RPC (Remote procedure call services) † Any service that uses IP address authentication † The X Window System † The R services suite (rlogin, rsh, etc.)
  • 5. TYPES OF IP SPOOFING † Blind Spoofing † Non-Blind Spoofing † Denial of Service attack † Man in the middle attack
  • 6. WHY IP SPOOFING? † The sender has some kind of malicious intention and does not want to be identified. † You can use the source address in the header of an IP datagram to trace the sender's location. † Most systems keep logs of Internet activity, so if attackers want to hide their identity, they need to change the source address. † The host receiving the spoofed packet responds to the spoofed address, so the attacker receives no reply back from the victim host.
  • 7. COUNTER MEASURES † Packet filtering † Limits of packet filtering † Filtering at the router † Disable commands