100% found this document useful (1 vote)
4K views1 page

Ip Spoofing ABSTRACT

IP spoofing is an attack method that allows unauthorized access to a network. The attacker sends messages to a targeted computer making it appear the messages are coming from a trusted system by determining the IP address of that system and modifying packet headers. The goal is to establish a connection that grants the attacker root access to the targeted host and allows creation of a backdoor entry point into the system, fooling the distant computer into thinking the attacker is a legitimate member of the network.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
4K views1 page

Ip Spoofing ABSTRACT

IP spoofing is an attack method that allows unauthorized access to a network. The attacker sends messages to a targeted computer making it appear the messages are coming from a trusted system by determining the IP address of that system and modifying packet headers. The goal is to establish a connection that grants the attacker root access to the targeted host and allows creation of a backdoor entry point into the system, fooling the distant computer into thinking the attacker is a legitimate member of the network.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 1

IP SPOOFING

ABSTRACT

Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
IP spoofing is a method of attacking a network in order to gain
unauthorized access. The attack is based on the fact that Internet
communication between distant computers is routinely handled by routers
which find the best route by examining the destination address, but
generally ignore the origination address. The origination address is only
used by the destination machine when it responds back to the source.

In a spoofing attack, the intruder sends messages to a computer


indicating that the message has come from a trusted system. To be
successful, the intruder must first determine the IP address of a trusted
system, and then modify the packet headers to that it appears that the
packets are coming from the trusted system.

In essence, the attacker is fooling (spoofing) the distant computer


into believing that they are a legitimate member of the network. The goal of
the attack is to establish a connection that will allow the attacker to gain
root access to the host, allowing the creation of a backdoor entry path into
the target system.

You might also like