WEB Spoofing: Guided By: Prepared by
WEB Spoofing: Guided By: Prepared by
SPOOFING
Guided by:
Prepared by:
Miss Shubhra Saxena Varun
kumar (lect. CSE)
CSE
VIIISem
WEB SPOOFING:
Is it
orkut.com (www.orkut.com/ ) OR
0rkut.com(www.tagomatic.com/view-
sites/0rkut.com/ )
SPOOFING ATTACKS IN THE
PHYSICAL WORLD
Inthe physical world For example, there
have been several incidents in which
criminals set up bogus automated teller
machines. the criminal copy the victim’s
card and use the duplicate.
In the these attack people were fooled for
the context what they saw. The location of
the machine and The appearance of their
electronic displays.
WORKS IN THE PAST
PRINCETON PART-I
victim
SERVER
1. A deceptive message is sent from
the phisher to the user.
2. A user provides confidential
information to a phishing server
(normally after some interaction
with the server).
3. The phisher obtains the
confidential information from the
server.
Information
4. The confidential information is
Flow Model used to impersonate the user.
5. The phisher obtains illicit monetary
gain.
CONSEQUENCES-
SURVEILLANCE
The attacker can passively watch the traffic,
recording which pages the victim visits and
the contacts of those pages.
This allows the attacker to observe any
account numbers or passwords the victim
enters.This is called as Desktop Monitoring.
TAMPERING –
The attacker can modify any of the data
traveling in either direction between the
victim and the Web, without letting victim
know.
The attacker would change the product
number, quantity or ship to address.
ANTI-SPOOFING
COUNTERMEASURES
To handle this type of crime, we need to work
in 3 Fields
Users (net training)
Softwares (antispyware)