28-05-2014, 02:09 PM
PRESENTATION ON IP SPOOFING
IP SPOOFING[.pptx (Size: 278.74 KB / Downloads: 15)
Spoofing
Is a situation in which one person or program
Successfully inserts false or misleading information in
e-mail or Netnews headers.Also known as “header
forgery”.
Overview
TCP/IP – in brief
IP Spoofing
Basic overview
Examples
Mitnick Attack
Session Hijack
DoS/DDoS Attack
Defending Against the Threat
Continuous Evolution
Conclusion
TCP/IP in 3 minute or less
IP is the internet layer protocol.
Does not guarantee delivery or ordering, only does its best to move packets from a source address to a destination address.
IP addresses are used to express the source and destination.
IP assumes that each address is unique within the network.
IP Spoofing – Basic Overview
Basically, IP spoofing is lying about an IP address.
Normally, the source address is incorrect.
Lying about the source address lets an attacker assume a new identity.
Denial of Service Attack
conducting the attack, attackers spoof source IP addresses to make tracing and stopping the DoS as difficult as possible. When multiple compromised hosts are participating in the attack, all sending spoofed traffic, it is very challenging to quickly block the traffic.
IP spoofing is almost always used in denial of service attacks (DoS), in which attackers are concerned with consuming bandwidth and resources by flooding the target with as many packets as possible in a short amount of time. To effectively
Conclusion
IP Spoofing is an old school Hacker trick that continues to evolve.
Can be used for a wide variety of purposes.
Will continue to represent a threat as long as each layer continues to trust each other and people are willing to subvert that trust.