SlideShare a Scribd company logo
IP SPOOFING
By IPSHITA NANDY
CSE,3RD YR, SEC-Y,234
Term IP Spoofing Indicates..?
⚫ Spoofing = Hocks / Tricks/Hiding
⚫ IP Spoofing = Hiding of Internet Protocol .
What is IP Spoofing..?
⚫ A Technique, used to gain
Unauthorized access to Machines.
⚫ It involves the creation of IP packets
which have a modified source
address.
⚫ IP Spoofing is also called IP Address
Forgery or Host File Hijack.
Why IP Spoofing is used..?
⚫ This eliminates the need for the hacker to provide a username and
password to log onto the network.
⚫ These are attacks that relate massive amounts of information being sent to
computers over a network in an attempt to crash the full network.
⚫ The hacker does not get caught because the origin of the messages cannot
be determined due to the bogus IP address.
How…?
Different Types of IP Spoofing…
⚫Denial of Service Attack(DOS attacks)
⚫Distributed Denial of Service(DDOS attacks)
⚫Man in the Middle Attack
⚫Non-Blind Spoofing
⚫Blind Spoofing
Denial-of-service(DOS) Attacks…
⚫ IP Spoofing is always used in DOS attacks.
⚫ DOS Attack is characterized by using a single computer to launch the attack
⚫ DOS attacks typically function by flooding a targeted machine with requests until normal
traffic is unable to be processed, resulting in denial-of-service to addition users.
Types of DOS Attacks:
>> Buffer overflow
>>Flood attacks
Distributed Denial-of-Service (DDoS)
Attack…
⚫ DDOS attack is a brute-force attempt to slow down or completely crash a
server
⚫ cut off users from a network resource by overwhelming it with requests for
service by using bot to carry out tasks simultaneously
Types of DDoS attacks🡪
1.volume based
2. Protocol based
3.application layer based
Man-in-the-Middle Attack…
⚫ These type is also called as connection hijacking
⚫ In this attack ,a malicious party intercepts a legitimate communication between two hosts to
controls the flow of communication and to eliminate of ter the info sent by one of the original
participants without their knowledge
⚫ In this way, an attacker can fool a victim into disclosing confidential information by “spoofing”
the Identity of the original sender.
Botnet…?
Robot + Network = Botnet
• Basically special types of
Trojan Viruses/Malware created
by Bot Master(Criminal)
• Used to breach the security of
several user’s Computers
• After infecting the target,
starts sending flood of request to
that network completely
shutdown the network
Anti Spoofing….?
There have some common tools available by which Spoofing can be
reduced🡪
⚫Packet Filtering
⚫Avoid Trust Relationships
⚫Use Spoofing Detection Software
⚫Use Cryptographic Network Protocols
⚫Use Firewall Protection
Advantages/Disadvantages…
⚫Advantages:
⚫ Ethical Hacking
⚫ Easy to Implement
⚫ Seamless Mobility
⚫ No need to change MAC or IP Address
⚫Disadvantages:
⚫ Ethernet does not scale
⚫ Long Path, State per MAC Address
⚫ Packets Flooding
Is IP Spoofing a Real Risk…?
⚫ The April 1989 article entitled:
“Security Problems in the TCP/IP
Protocol Suite” by S.M Bellovin
indentified that IP Spoofing is really a
risk to computer networks.
⚫ New Internet research shows 30,000
Spoofing Attacks/day
⚫ The Statistics of IP Spoofing is
increased exponentially day by day.
Conclusion…
⚫IP Spoofing is an old Hacker Trick that continues to evolve.
⚫Will continue to represent a threat as long as each layer
continues to trust each other.
 ip spoofing by Ipshita Nandy

More Related Content

What's hot

Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
Animesh Behera
 
র‌্যানসমওয়্যার
র‌্যানসমওয়্যার র‌্যানসমওয়্যার
র‌্যানসমওয়্যার
Titas Sarker
 
Poster - FATIN FAZAIN_KRK_FYP2
Poster - FATIN FAZAIN_KRK_FYP2Poster - FATIN FAZAIN_KRK_FYP2
Poster - FATIN FAZAIN_KRK_FYP2
FATIN FAZAIN MOHD AFFANDI
 
Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
Napier University
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
Inderjeet Singh
 
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
HackIT Ukraine
 
What is FIDO
What is FIDOWhat is FIDO
What is FIDO
Peter Kolarov
 
Methods of Cybersecurity Attacks
Methods of Cybersecurity AttacksMethods of Cybersecurity Attacks
Methods of Cybersecurity Attacks
ZyrellLalaguna
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
ZTech Proje
 
Ransomware
RansomwareRansomware
Ransomware
Akshita Pillai
 
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde..."Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
HackIT Ukraine
 
45
4545
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
Lokesh Bysani
 
Ransomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionRansomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, Prevention
Mohammad Yahya
 
Ga13
Ga13Ga13
Ga13
s1170143
 
Ransomeware
RansomewareRansomeware
Ransomeware
Abul Hossain Ripon
 
Web security
Web securityWeb security
Web security
rakesh bandaru
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Adri Jovin
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
Hatem Mahmoud
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Pradeep Sharma
 

What's hot (20)

Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
র‌্যানসমওয়্যার
র‌্যানসমওয়্যার র‌্যানসমওয়্যার
র‌্যানসমওয়্যার
 
Poster - FATIN FAZAIN_KRK_FYP2
Poster - FATIN FAZAIN_KRK_FYP2Poster - FATIN FAZAIN_KRK_FYP2
Poster - FATIN FAZAIN_KRK_FYP2
 
Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
 
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
 
What is FIDO
What is FIDOWhat is FIDO
What is FIDO
 
Methods of Cybersecurity Attacks
Methods of Cybersecurity AttacksMethods of Cybersecurity Attacks
Methods of Cybersecurity Attacks
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
Ransomware
RansomwareRansomware
Ransomware
 
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde..."Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
 
45
4545
45
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
 
Ransomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionRansomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, Prevention
 
Ga13
Ga13Ga13
Ga13
 
Ransomeware
RansomewareRansomeware
Ransomeware
 
Web security
Web securityWeb security
Web security
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Similar to ip spoofing by Ipshita Nandy

Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
UNIT 5 (2).pptx
UNIT 5 (2).pptxUNIT 5 (2).pptx
UNIT 5 (2).pptx
janani603976
 
Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
TechGenie
 
342_IP_Spoofing.pptx
342_IP_Spoofing.pptx342_IP_Spoofing.pptx
342_IP_Spoofing.pptx
RajeshArora97
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
Tenet Systems Pvt Ltd
 
Network Security
Network SecurityNetwork Security
Network Security
Puneet Abichandani
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
Mehedi Hasan
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Prabhat kumar Suman
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
aashish2cool4u
 
hacking
hackinghacking
hacking
ADAIKKAPPANS1
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
Cmano Kar
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
prachi67
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
Apurv Singh Gautam
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
Arjun Tomar
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
New Horizons Bulgaria
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
sxkkjbzq2k
 

Similar to ip spoofing by Ipshita Nandy (20)

Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
UNIT 5 (2).pptx
UNIT 5 (2).pptxUNIT 5 (2).pptx
UNIT 5 (2).pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
342_IP_Spoofing.pptx
342_IP_Spoofing.pptx342_IP_Spoofing.pptx
342_IP_Spoofing.pptx
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Network Security
Network SecurityNetwork Security
Network Security
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
hacking
hackinghacking
hacking
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 

ip spoofing by Ipshita Nandy

  • 1. IP SPOOFING By IPSHITA NANDY CSE,3RD YR, SEC-Y,234
  • 2. Term IP Spoofing Indicates..? ⚫ Spoofing = Hocks / Tricks/Hiding ⚫ IP Spoofing = Hiding of Internet Protocol .
  • 3. What is IP Spoofing..? ⚫ A Technique, used to gain Unauthorized access to Machines. ⚫ It involves the creation of IP packets which have a modified source address. ⚫ IP Spoofing is also called IP Address Forgery or Host File Hijack.
  • 4. Why IP Spoofing is used..? ⚫ This eliminates the need for the hacker to provide a username and password to log onto the network. ⚫ These are attacks that relate massive amounts of information being sent to computers over a network in an attempt to crash the full network. ⚫ The hacker does not get caught because the origin of the messages cannot be determined due to the bogus IP address.
  • 6. Different Types of IP Spoofing… ⚫Denial of Service Attack(DOS attacks) ⚫Distributed Denial of Service(DDOS attacks) ⚫Man in the Middle Attack ⚫Non-Blind Spoofing ⚫Blind Spoofing
  • 7. Denial-of-service(DOS) Attacks… ⚫ IP Spoofing is always used in DOS attacks. ⚫ DOS Attack is characterized by using a single computer to launch the attack ⚫ DOS attacks typically function by flooding a targeted machine with requests until normal traffic is unable to be processed, resulting in denial-of-service to addition users. Types of DOS Attacks: >> Buffer overflow >>Flood attacks
  • 8. Distributed Denial-of-Service (DDoS) Attack… ⚫ DDOS attack is a brute-force attempt to slow down or completely crash a server ⚫ cut off users from a network resource by overwhelming it with requests for service by using bot to carry out tasks simultaneously Types of DDoS attacks🡪 1.volume based 2. Protocol based 3.application layer based
  • 9. Man-in-the-Middle Attack… ⚫ These type is also called as connection hijacking ⚫ In this attack ,a malicious party intercepts a legitimate communication between two hosts to controls the flow of communication and to eliminate of ter the info sent by one of the original participants without their knowledge ⚫ In this way, an attacker can fool a victim into disclosing confidential information by “spoofing” the Identity of the original sender.
  • 10. Botnet…? Robot + Network = Botnet • Basically special types of Trojan Viruses/Malware created by Bot Master(Criminal) • Used to breach the security of several user’s Computers • After infecting the target, starts sending flood of request to that network completely shutdown the network
  • 11. Anti Spoofing….? There have some common tools available by which Spoofing can be reduced🡪 ⚫Packet Filtering ⚫Avoid Trust Relationships ⚫Use Spoofing Detection Software ⚫Use Cryptographic Network Protocols ⚫Use Firewall Protection
  • 12. Advantages/Disadvantages… ⚫Advantages: ⚫ Ethical Hacking ⚫ Easy to Implement ⚫ Seamless Mobility ⚫ No need to change MAC or IP Address ⚫Disadvantages: ⚫ Ethernet does not scale ⚫ Long Path, State per MAC Address ⚫ Packets Flooding
  • 13. Is IP Spoofing a Real Risk…? ⚫ The April 1989 article entitled: “Security Problems in the TCP/IP Protocol Suite” by S.M Bellovin indentified that IP Spoofing is really a risk to computer networks. ⚫ New Internet research shows 30,000 Spoofing Attacks/day ⚫ The Statistics of IP Spoofing is increased exponentially day by day.
  • 14. Conclusion… ⚫IP Spoofing is an old Hacker Trick that continues to evolve. ⚫Will continue to represent a threat as long as each layer continues to trust each other.