Professional Documents
Culture Documents
BY R.seetharama rao
BT IT
IP SPOOFING ?
IP Spoofing is a technique used to gain
unauthorized access to computers. IP: Internet Protocol
IP SPOOFING
IP SPOOFING STEPS
Selecting a target host
Identify a host that the target trust
Spoofing Attacks
Spoofing is classified into :-
Detection of IP Spoofing
If you monitor packets using network-monitoring software such as net log, look for a packet on your external interface that has both its source and destination IP addresses in your local domain. If you find one, you are currently under attack.
IP-Spoofing Counter-measures
No insecure authenticated services
IP Trace-back
To trace back as close to the attackers location
as possible
Applications
Asymmetric routing (Splitting routing) NAT (Network Address Transaction) IP Masquerade
ADVANTAGES
Multiple Servers
Transparent Proxying
DISADVANTAGES
Blind to Replies :
In the scanning attack as we will see next the attacker may need to see replies in such cases ,the attacker can not use IP address spoofing .
CONCLUSION
IP spoofing attacks is unavoidable.
Understanding how and why spoofing attacks are used, combined with a few simple prevention methods, can help protect your network from these malicious cloaking and cracking techniques.
THANK YOU !