You are on page 1of 1

IP Spoofing

Suneeta Chawla

Abstract: The report explains the IP-spoofing attack as complex technical attack that is made up of several components. In actuality, IP-spoofing is not the attack, but a step in the attack. The attack is actually trust-relationship exploitation. The relevant operating system and networking information is also provided to support the explanation of the attack. The study includes examination of the TCP IP protocol suite structure, how the attack works, types of spoofing attacks, where it is used and lists down a few solutions how to defend the attack. Resources: !. http" www.networkcommand.com docs ipspoof.txt #. http" www.securityfocus.com infocus !$%&

You might also like