Ip Spoofing: Submitted by Sharon Geo Reji S2 Cse

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 18

IP SPOOFING

SUBMITTED BY
SHARON GEO REJI
S2 CSE
CONTENTS
• What is spoofing
• Types of spoofing
• Ip spoofing
• Ip spoofing attacks
• Prevention of Ip spoofing
• Ip spoofing applications
• Reference
SPOOFING
It is a situation in which one person or program successfully
masquerades as another by falsifying information/data and thereby
gaining an illegitimate advantage.
TYPES OF SPOOFING

• IP spoofing: Attacker uses IP address of another computer to


acquire information or gain access from another network.
• Email spoofing: Attacker sends email but makes it appear to come
from someone else(reliable email).
• Web spoofing: Attacker tricks web browser into communicating
with a different web server than the user intended.
IP SPOOFING
A technique used to gain unauthorized access to computers, whereby the
intruder sends messages to a computer with an IP address indicating that the
message is coming from a trusted host.
IP DATAGRAM
• The job of IP is to route and send a packet to the packet’s destination.
• IP provides no guarantee , for the packets it tries to deliver.
• IP is the internet layer protocol.
TCP HEADER
TCP provides reliable and guaranteed delivery of packets
IP SPOOFING MECHANISM
TYPES OF IP SPOOFING ATTACKS

• Blind Spoofing Attack


• Non-Blind Spoofing Attack
• Man In The Middle Attack
• Denial of Service (DOS) Attack
1. BLIND SPOOFING

Usually the attacker does not have access to the reply.


e.g. Host C sends an IP datagram with the address of some other host (Host A)
as the source address to Host B. Attacked host (B) replies to the legitimate host (A)
2. NON-BLIND SPOOFING
Takes place when the attacker is on the same subnet as the victim. This allows
the attacker to sniff packets making the next sequence number available to
him.
3. MAN IN THE MIDDLE ATTACK
In these attacks, a malicious party intercepts a legitimate communication between two friendly parties. The malicious
host then controls the flow of communication and can eliminate or alter the information sent by one of the original
participants without the knowledge of either the original sender or the recipient.

If an attacker controls a gateway that is in the delivery route, he can


• intercept / block / delay traffic
• sniff the traffic
• modify traffic
4.DENIAL OF SERVICE ATTACK

• IP spoofing is always used in DOS attacks.


• Attackers are concerned with consuming bandwidth and resources
by flooding the target with as many packets as possible in a short
amount of time.
PREVENTING IP SPOOFING
ATTACKS
Filtering at the Router border:
• Main idea is to check the Source IP address and validate it.
• Look for invalid source IP addresses, and discard it.

Use cryptographic network protocols:


• Transport Layer Security (TLS), Secure Shell (SSH), HTTP Secure
(HTTPS)
Disable Commands :
• Prevent from aFiltering at the Router border:ttacks by not using address-based authentication.
Disable all the r* commands.
• Empty out the /etc/hosts.equiv file.
NETWORK ADDRESS
TRANSLATION(NAT)
• Nat are used to alter the packet (address) as it passes over the network.

• It keeps tracks of the mangled/altered data as it retranslates it when the reply packets are
routed back
CONCLUSION

• IP Spoofing is an old Hacker trick that continues to


evolve.
• Will continue to represent a threat as long as each
layer continues to trust each other.
REFERENCE
• https://www.cloudflare.com/en-in/learning/ddos/glossary/ip-spoofing/

• https://www.kaspersky.com/resource-center/threats/ip

• https://www.imperva.com/learn/ddos/ip-spoofing/
THANK
YOU

You might also like