You are on page 1of 14

IP Spoofing

BY R.seetharama rao
BT IT

UNDER GUIDANCE OF Mr.murtuza

IP SPOOFING ?
IP Spoofing is a technique used to gain
unauthorized access to computers. IP: Internet Protocol

Spoofing: using somebody elses information

Exploits the trust relationships Intruder sends messages to a computer with an IP


address of a trusted host.

IP SPOOFING

WHY IP SPOOFING IS EASY ?


Problem with the Routers.

Routers look at Destination addresses only.


Authentication based on Source addresses only.

IP SPOOFING STEPS
Selecting a target host
Identify a host that the target trust

Disable the trusted host


Connection attempt to a service that only requires
address-based authentication.

If successfully connected, executes a simple


command to leave a backdoor.

Spoofing Attacks
Spoofing is classified into :-

1. Non-blind spoofing 2. Blind spoofing

3. Man - in - the middle

Detection of IP Spoofing
If you monitor packets using network-monitoring software such as net log, look for a packet on your external interface that has both its source and destination IP addresses in your local domain. If you find one, you are currently under attack.

IP-Spoofing Counter-measures
No insecure authenticated services

Disable commands like ping


Use encryption

IP Trace-back
To trace back as close to the attackers location
as possible

Limited in reliability and efficiency


Require cooperation of many other network
operators along the routing path

Applications
Asymmetric routing (Splitting routing) NAT (Network Address Transaction) IP Masquerade

ADVANTAGES

Multiple Servers

Transparent Proxying

DISADVANTAGES
Blind to Replies :
In the scanning attack as we will see next the attacker may need to see replies in such cases ,the attacker can not use IP address spoofing .

Serial attack platforms:


Attacker attacks the target victim using a point host-the last host in the attack chain .Even if authorities learn the point hosts identity

CONCLUSION
IP spoofing attacks is unavoidable.

Understanding how and why spoofing attacks are used, combined with a few simple prevention methods, can help protect your network from these malicious cloaking and cracking techniques.

THANK YOU !

You might also like