IP spoofing is when an attacker forges the source IP address in IP packets sent to a computer network to conceal their identity or impersonate another system. It is done by determining the IP address of a trusted system and modifying packet headers to appear to come from that system. Services vulnerable to IP spoofing include RPC, services using IP address authentication, the X Window System, and R services. Types of IP spoofing include blind spoofing, non-blind spoofing, denial of service attacks, and man-in-the-middle attacks. Countermeasures include packet filtering, filtering at routers, and disabling vulnerable commands.