SlideShare a Scribd company logo
1 of 15
02
Spoofing attack
THE ART OF HOAX OR TRICK SOMEONE
CALL, SMS, EMAIL, IP, MAC & DNS Spoofing
Hacking and penetration testing tutorial
PANKAJ DUBEY
Sr. QA Engineer
pankajdubeyk@gmail.com
http://PRELRIK.COM
http://youtube.com/c/prelrik
What is spoofing
● Spoofing is an art of faking a real identity
● The main purpose is to trick the authenticator to release
sensitive information or to gain unauthorized access
● Ex - An attacker can book a domain like faceb00k.com to
make a similar looking URL of facebook.com, also they can
get a copy of original site by web mirroring tools.
“In the context of computer security, a spoofing attack is an
attack in which one person or program successfully acts as
another by falsifying data, thereby gaining an illegitimate
advantage.”
An Example - CEO CFO frauds
“CEO fraud usually begins with the thieves either phishing an executive and
gaining access to that individual’s inbox, or emailing employees from a look-
alike domain name that is one or two letters off from the target company’s
true domain name. “
● In first point, attacker spoofs the email ID of CEO
● In second point, attacker spoofed the cell number to make a fake call or SMS
● According to an FBI report, US companies lost 2.3 Billion dollars from Oct13 to Feb16 due to
CEO fraud attacks
What can be spoofed?
Website Email ID
Caller ID IP Address
MAC Address
GPS location
DNS
Call, SMS
website spoofing
“Website spoofing is creating a hoax copy of the original website to
mislead the real website users.”
● It requires similar URL and same design of the original site
● http://000webhost.com is a hosting service provider for free
● http://freenom.com is a site to get similar domains for free
● This technique is also known as URL SPOOFING
● Web mirroring software or websites allows us to download a website in local directory with
same design, just write your function to get what you want.
Tools - HTTRACK WEBSITE COPIER, Surf-offline
email spoofing
“Email spoofing is sending of emails with
a forged sender, where sender’s email ID
looks same or similar but in reality that’s
a fake.”
● The famous CEO CFO frauds are usually done using
this technique
● http://emkei.cz is a site that can be used for email
spoofing
● Email spoofing mainly requires a similar looking
domain name
Safeguards against email spoofing
● It’s strongly recommended for pen tester’s to check that service provider sites
doesn’t open inside a company
● Never download any file from untrusted sender’s email ID or click on the URL
mentioned.
● Always check and ensure that the sender’s email ID is correct. Look at the
spellings.
● In case, you have downloaded any suspicious file, never enable Macros if asked.
Caller ID spoofing
“Call spoofing is a technique of making a call or SMS with a fake
caller ID to pretend to be someone else.”
● Caller ID spoofing is done to hide the real Identity of caller
● http://crazycall.net , www.spooftel.com are some sites used for call spoofing
● Caller ID can be spoofed to make calls and messages
● http://spoofcard.com , is a site used for SMS spoofing
Laws of Land for Caller ID spoofing
USA - Legally allowed, unless any fraud isn’t done
UK - Spoofed numbers are allocated to third party and in some cases individuals, It can be made
with third party’s permission
INDIA - Caller ID spoofing is illegal here and all service providing sites are usually blocked
CANADA - It’s legal and allowed in Canada
IP address spoofing (1/2)
“IP spoofing is a technique of masking the real IP of computer with a fake
IP while interacting on world wide web.”
● It’s a major threat where IP based authentication is allowed.
● IP or Internet Protocol is the basic protocol for communication over internet. Where each
data packet’s must have an associated IP of the sender. In this case user temper’s the IP
address associated with data packet.
● IP spoofing is widely be used for DoS (Denial of Service) attacks to hide the real sender’s IP
IP address spoofing (2/2)
Spoofed IP packets are also used in performance testing of websites.
Where hundreds or even thousands of virtual users may be created, each executing a test
script against the website under test, in order to simulate what will happen when the
system goes "live" and a large number of users log on at once.
● Since each user will normally have its own IP address, commercial testing products (such
as HP LoadRunner, WebLOAD, and others) can use IP spoofing, allowing each user its own
"return address" as well.
● Any service that uses IP address authentication
Penetration testing against IP spoofing
Packet filtering is one defense against IP spoofing attacks.
Ingress filtering is a technique used to ensure that incoming packets are actually from the
networks from which they claim to originate.
● This can be used as a countermeasure against various spoofing attacks where the
attacker's packets contain fake IP addresses to make it difficult to find the source of the
attack.
● This technique is often used in the denial-of-service attack, and this is a primary target of
ingress filtering.
MAC spoofing
“MAC spoofing is a technique for changing a factory-assigned Media Access
Control (MAC) address of a network interface on a networked device”
● MAC address spoofing is not illegal, its practice has caused controversy in some cases
● The changing of the assigned MAC address may allow the bypassing of access control
lists on servers or routers, either hiding a computer on a network or allowing it to
impersonate another network device.
GPS spoofing
“A GPS spoofing attack attempts to trick a GPS receiver by broadcasting
incorrect GPS signals, structured to resemble a set of normal GPS signals, or by
rebroadcasting genuine signals captured elsewhere or at a different time. “
● The signal can cause the receiver to report a position chosen by the attacker that is
somewhere other than where the receiver actually is
● It has been suggested that the capture of a Lockheed RQ-170 drone aircraft in
northeastern Iran in December, 2011 was the result of such an attack
DNS spoofing
“DNS spoofing, also referred to as DNS cache poisoning, is a form of computer
security hacking in which corrupt Domain Name System data is introduced into
the DNS resolver’s cache, causing the name server to return an incorrect IP
address. This results in traffic being diverted to the attacker's computer.”
DNS Spoofing can be done by:
● Compromising the DNS server
● Man in the middle attack
● Mounting a DNS poisoning attack
● DNS cache poisoning is one way to do DNS spoofing

More Related Content

What's hot

What's hot (20)

Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Email Spoofing.pptx
Email Spoofing.pptxEmail Spoofing.pptx
Email Spoofing.pptx
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 
Spoofing
SpoofingSpoofing
Spoofing
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Cyber security
Cyber securityCyber security
Cyber security
 
spyware
spywarespyware
spyware
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Social engineering
Social engineering Social engineering
Social engineering
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless Networks
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Spoofing Attack Techniques Explained

342_IP_Spoofing.pptx
342_IP_Spoofing.pptx342_IP_Spoofing.pptx
342_IP_Spoofing.pptxRajeshArora97
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Securitypadmeshagrekar
 
Security concepts
Security conceptsSecurity concepts
Security conceptsartisriva
 
Ip spoofing & types of attachs using it
Ip spoofing & types of attachs using itIp spoofing & types of attachs using it
Ip spoofing & types of attachs using itRajesh Porwal
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing AttacksPECB
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxSuhailShaik16
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?TechGenie
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber worldNikhil Tripathi
 
Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)SHUBHA CHATURVEDI
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer AttacksArun Modi
 
ip spoofing by Ipshita Nandy
 ip spoofing by Ipshita Nandy ip spoofing by Ipshita Nandy
ip spoofing by Ipshita NandyIpshitaNandy
 
bh-usa-07-grossman-WP.pdf
bh-usa-07-grossman-WP.pdfbh-usa-07-grossman-WP.pdf
bh-usa-07-grossman-WP.pdfcyberhacker7
 

Similar to Spoofing Attack Techniques Explained (20)

342_IP_Spoofing.pptx
342_IP_Spoofing.pptx342_IP_Spoofing.pptx
342_IP_Spoofing.pptx
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
 
Spamming, spoofing, Dos&DDos attack
Spamming, spoofing, Dos&DDos attackSpamming, spoofing, Dos&DDos attack
Spamming, spoofing, Dos&DDos attack
 
Network security
Network securityNetwork security
Network security
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
Ip spoofing & types of attachs using it
Ip spoofing & types of attachs using itIp spoofing & types of attachs using it
Ip spoofing & types of attachs using it
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing Attacks
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber world
 
Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)
 
spoofing.ppt
spoofing.pptspoofing.ppt
spoofing.ppt
 
Spoofing
SpoofingSpoofing
Spoofing
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer Attacks
 
Infosec
InfosecInfosec
Infosec
 
IP spoofing .pptx
IP spoofing .pptxIP spoofing .pptx
IP spoofing .pptx
 
ip spoofing by Ipshita Nandy
 ip spoofing by Ipshita Nandy ip spoofing by Ipshita Nandy
ip spoofing by Ipshita Nandy
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
bh-usa-07-grossman-WP.pdf
bh-usa-07-grossman-WP.pdfbh-usa-07-grossman-WP.pdf
bh-usa-07-grossman-WP.pdf
 

More from Pankaj Dubey

Software Testing interview - Q&A and tips
Software Testing interview - Q&A and tipsSoftware Testing interview - Q&A and tips
Software Testing interview - Q&A and tipsPankaj Dubey
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attackPankaj Dubey
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guidePankaj Dubey
 
Selenium locators: ID, Name, xpath, CSS Selector advance methods
Selenium locators: ID, Name,  xpath, CSS Selector advance methodsSelenium locators: ID, Name,  xpath, CSS Selector advance methods
Selenium locators: ID, Name, xpath, CSS Selector advance methodsPankaj Dubey
 
Selenium introduction
Selenium introductionSelenium introduction
Selenium introductionPankaj Dubey
 
Software testing course - Manual
Software testing course - ManualSoftware testing course - Manual
Software testing course - ManualPankaj Dubey
 

More from Pankaj Dubey (6)

Software Testing interview - Q&A and tips
Software Testing interview - Q&A and tipsSoftware Testing interview - Q&A and tips
Software Testing interview - Q&A and tips
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
Selenium locators: ID, Name, xpath, CSS Selector advance methods
Selenium locators: ID, Name,  xpath, CSS Selector advance methodsSelenium locators: ID, Name,  xpath, CSS Selector advance methods
Selenium locators: ID, Name, xpath, CSS Selector advance methods
 
Selenium introduction
Selenium introductionSelenium introduction
Selenium introduction
 
Software testing course - Manual
Software testing course - ManualSoftware testing course - Manual
Software testing course - Manual
 

Recently uploaded

Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 

Recently uploaded (20)

Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 

Spoofing Attack Techniques Explained

  • 1. 02 Spoofing attack THE ART OF HOAX OR TRICK SOMEONE CALL, SMS, EMAIL, IP, MAC & DNS Spoofing Hacking and penetration testing tutorial PANKAJ DUBEY Sr. QA Engineer pankajdubeyk@gmail.com http://PRELRIK.COM http://youtube.com/c/prelrik
  • 2. What is spoofing ● Spoofing is an art of faking a real identity ● The main purpose is to trick the authenticator to release sensitive information or to gain unauthorized access ● Ex - An attacker can book a domain like faceb00k.com to make a similar looking URL of facebook.com, also they can get a copy of original site by web mirroring tools. “In the context of computer security, a spoofing attack is an attack in which one person or program successfully acts as another by falsifying data, thereby gaining an illegitimate advantage.”
  • 3. An Example - CEO CFO frauds “CEO fraud usually begins with the thieves either phishing an executive and gaining access to that individual’s inbox, or emailing employees from a look- alike domain name that is one or two letters off from the target company’s true domain name. “ ● In first point, attacker spoofs the email ID of CEO ● In second point, attacker spoofed the cell number to make a fake call or SMS ● According to an FBI report, US companies lost 2.3 Billion dollars from Oct13 to Feb16 due to CEO fraud attacks
  • 4. What can be spoofed? Website Email ID Caller ID IP Address MAC Address GPS location DNS Call, SMS
  • 5. website spoofing “Website spoofing is creating a hoax copy of the original website to mislead the real website users.” ● It requires similar URL and same design of the original site ● http://000webhost.com is a hosting service provider for free ● http://freenom.com is a site to get similar domains for free ● This technique is also known as URL SPOOFING ● Web mirroring software or websites allows us to download a website in local directory with same design, just write your function to get what you want. Tools - HTTRACK WEBSITE COPIER, Surf-offline
  • 6. email spoofing “Email spoofing is sending of emails with a forged sender, where sender’s email ID looks same or similar but in reality that’s a fake.” ● The famous CEO CFO frauds are usually done using this technique ● http://emkei.cz is a site that can be used for email spoofing ● Email spoofing mainly requires a similar looking domain name
  • 7. Safeguards against email spoofing ● It’s strongly recommended for pen tester’s to check that service provider sites doesn’t open inside a company ● Never download any file from untrusted sender’s email ID or click on the URL mentioned. ● Always check and ensure that the sender’s email ID is correct. Look at the spellings. ● In case, you have downloaded any suspicious file, never enable Macros if asked.
  • 8. Caller ID spoofing “Call spoofing is a technique of making a call or SMS with a fake caller ID to pretend to be someone else.” ● Caller ID spoofing is done to hide the real Identity of caller ● http://crazycall.net , www.spooftel.com are some sites used for call spoofing ● Caller ID can be spoofed to make calls and messages ● http://spoofcard.com , is a site used for SMS spoofing
  • 9. Laws of Land for Caller ID spoofing USA - Legally allowed, unless any fraud isn’t done UK - Spoofed numbers are allocated to third party and in some cases individuals, It can be made with third party’s permission INDIA - Caller ID spoofing is illegal here and all service providing sites are usually blocked CANADA - It’s legal and allowed in Canada
  • 10. IP address spoofing (1/2) “IP spoofing is a technique of masking the real IP of computer with a fake IP while interacting on world wide web.” ● It’s a major threat where IP based authentication is allowed. ● IP or Internet Protocol is the basic protocol for communication over internet. Where each data packet’s must have an associated IP of the sender. In this case user temper’s the IP address associated with data packet. ● IP spoofing is widely be used for DoS (Denial of Service) attacks to hide the real sender’s IP
  • 11. IP address spoofing (2/2) Spoofed IP packets are also used in performance testing of websites. Where hundreds or even thousands of virtual users may be created, each executing a test script against the website under test, in order to simulate what will happen when the system goes "live" and a large number of users log on at once. ● Since each user will normally have its own IP address, commercial testing products (such as HP LoadRunner, WebLOAD, and others) can use IP spoofing, allowing each user its own "return address" as well. ● Any service that uses IP address authentication
  • 12. Penetration testing against IP spoofing Packet filtering is one defense against IP spoofing attacks. Ingress filtering is a technique used to ensure that incoming packets are actually from the networks from which they claim to originate. ● This can be used as a countermeasure against various spoofing attacks where the attacker's packets contain fake IP addresses to make it difficult to find the source of the attack. ● This technique is often used in the denial-of-service attack, and this is a primary target of ingress filtering.
  • 13. MAC spoofing “MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device” ● MAC address spoofing is not illegal, its practice has caused controversy in some cases ● The changing of the assigned MAC address may allow the bypassing of access control lists on servers or routers, either hiding a computer on a network or allowing it to impersonate another network device.
  • 14. GPS spoofing “A GPS spoofing attack attempts to trick a GPS receiver by broadcasting incorrect GPS signals, structured to resemble a set of normal GPS signals, or by rebroadcasting genuine signals captured elsewhere or at a different time. “ ● The signal can cause the receiver to report a position chosen by the attacker that is somewhere other than where the receiver actually is ● It has been suggested that the capture of a Lockheed RQ-170 drone aircraft in northeastern Iran in December, 2011 was the result of such an attack
  • 15. DNS spoofing “DNS spoofing, also referred to as DNS cache poisoning, is a form of computer security hacking in which corrupt Domain Name System data is introduced into the DNS resolver’s cache, causing the name server to return an incorrect IP address. This results in traffic being diverted to the attacker's computer.” DNS Spoofing can be done by: ● Compromising the DNS server ● Man in the middle attack ● Mounting a DNS poisoning attack ● DNS cache poisoning is one way to do DNS spoofing