0% found this document useful (0 votes)
2K views14 pages

Ip Spoofing

IP spoofing is a technique used to gain unauthorized access to computers by sending messages with a spoofed, trusted IP address. It is easy to spoof IP addresses because routers only look at destination addresses, not source addresses, for authentication. To spoof an IP address, an attacker selects a target, identifies a host the target trusts, disables the trusted host, and attempts to connect to a service that requires only address-based authentication to execute commands or leave a backdoor. Detection involves monitoring for packets with internal source and destination addresses on an external interface. Prevention methods include disabling insecure services, ping, and using encryption. Traceback of spoofed addresses is limited and unreliable.

Uploaded by

Phani Kumar
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views14 pages

Ip Spoofing

IP spoofing is a technique used to gain unauthorized access to computers by sending messages with a spoofed, trusted IP address. It is easy to spoof IP addresses because routers only look at destination addresses, not source addresses, for authentication. To spoof an IP address, an attacker selects a target, identifies a host the target trusts, disables the trusted host, and attempts to connect to a service that requires only address-based authentication to execute commands or leave a backdoor. Detection involves monitoring for packets with internal source and destination addresses on an external interface. Prevention methods include disabling insecure services, ping, and using encryption. Traceback of spoofed addresses is limited and unreliable.

Uploaded by

Phani Kumar
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 14

IP Spoofing

BY R.seetharama rao
BT IT

UNDER GUIDANCE OF Mr.murtuza

IP SPOOFING ?
IP Spoofing is a technique used to gain
unauthorized access to computers. IP: Internet Protocol

Spoofing: using somebody elses information

Exploits the trust relationships Intruder sends messages to a computer with an IP


address of a trusted host.

IP SPOOFING

WHY IP SPOOFING IS EASY ?


Problem with the Routers.

Routers look at Destination addresses only.


Authentication based on Source addresses only.

IP SPOOFING STEPS
Selecting a target host
Identify a host that the target trust

Disable the trusted host


Connection attempt to a service that only requires
address-based authentication.

If successfully connected, executes a simple


command to leave a backdoor.

Spoofing Attacks
Spoofing is classified into :-

1. Non-blind spoofing 2. Blind spoofing

3. Man - in - the middle

Detection of IP Spoofing
If you monitor packets using network-monitoring software such as net log, look for a packet on your external interface that has both its source and destination IP addresses in your local domain. If you find one, you are currently under attack.

IP-Spoofing Counter-measures
No insecure authenticated services

Disable commands like ping


Use encryption

IP Trace-back
To trace back as close to the attackers location
as possible

Limited in reliability and efficiency


Require cooperation of many other network
operators along the routing path

Applications
Asymmetric routing (Splitting routing) NAT (Network Address Transaction) IP Masquerade

ADVANTAGES

Multiple Servers

Transparent Proxying

DISADVANTAGES
Blind to Replies :
In the scanning attack as we will see next the attacker may need to see replies in such cases ,the attacker can not use IP address spoofing .

Serial attack platforms:


Attacker attacks the target victim using a point host-the last host in the attack chain .Even if authorities learn the point hosts identity

CONCLUSION
IP spoofing attacks is unavoidable.

Understanding how and why spoofing attacks are used, combined with a few simple prevention methods, can help protect your network from these malicious cloaking and cracking techniques.

THANK YOU !

You might also like