IP SPOOFING
Submitted BY :- Manav Gaur
Submitted To :- Mr. Vishnu Kumar Barodiya
• INTRODUCTION
• How IP Spoofing Works ?
• Types of IP Spoofing
• RISKS ASSOCIATED
• Example of IP Spoofing Attack
• DIFFERENT WAYS
• CONCLUSION
INTRODUCTION
IP Spoofing is essentially a technique used by
a hacker to gain unauthorized access to Computers.
The attacker creates packets, changing the source IP
address to impersonate a different computer system,
disguise the sender's identity or both.
3
HOW IP SPOOFING WORKS
IP spoofing works by modifying the packet header
of IP packets. The packet header contains
information about the source and destination IP
addresses, as well as other information such as the
packet type and length. By modifying the packet
header, the attacker can make it appear as if the
packets are coming from a different source IP
address.
TYPES OF IP SPOOFING ARE:-
SOURCE IP SPOOFING DESTINATION IP SPOOFING
• This is the most common type of IP spoofing. • This type of IP spoofing is less common
than source IP spoofing.
• It involves changing the source IP address in
the packet header to make it appear as if the • It involves changing the destination IP
packets are coming from a trusted source. address in the packet header to make it
appear as if the packets are going to a
• For example, an attacker might spoof the IP
different destination.
address of a popular website in order to trick
users into clicking on a malicious link. • This can be used to launch denial-of-
service attacks against specific targets.
RISKS ASSOCIATED
• Denial-of-service attacks: An attacker can use IP Spoofing to flood a network or
system with a large number of requests, making it unavailable to legitimate users.
EXAMPLES OF IP
SPOOFING ATTACKS
o Man-in-the-middle attack:- In a man-in-the-middle attack, the
attacker spoofs the IP address of a trusted source in order to
intercept and modify traffic between the victim and the trusted
source. For example, an attacker might spoof the IP address of a
bank's website in order to steal users' login credentials.
o Ping of death:- In a ping of death attack, the attacker sends a ping
request to the victim's computer that is larger than the maximum size
of an IP packet. This can cause the victim's computer to crash.
7
DIFFERENT WAYS TO ADDRESS
IP SPOOFING
• Do not reveal any information regarding your internal IP addresses.This helps prevent those addresses from being
spoofed.
• Monitor incoming IP packets for signs of IP spoofing using network monitoring software. This essentially means an
incoming packet that claims to be from inside network is actually coming from outside your network. Finding one
means that an attack is underway.
Danger that IP spoofing contains is that some firewalls do not examine packets that appear to come from an internal IP
address.Routing packets through filtering router is possible, if they are not configured to filter incoming packets whose
source address is in local domain.
8
CONCLUSION
o IP spoofing attacks are becoming less frequent.
o Primarily because the Venues they use have become more
Secure and in some case no longer used.
o Spoofing can still be used and all security administrators should
address it.
THANK YOU