SlideShare uma empresa Scribd logo
1 de 19
IP SPOOFING
Precap…
 What is spoofing
 Types of spoofing
 Ip spoofing
 Ip spoofing attacks
 Prevention of Ip spoofing
 Ip spoofing applications
 Reference
Spoofing
 It is a situation in which one person or program successfully masquerades
as another by falsifying information/data and thereby gaining an
illegitimate advantage.
Types of spoofing
 IP spoofing: Attacker uses IP address
of another computer to acquire
information or gain access from
another network.
 Email spoofing: Attacker sends email
but makes it appear to come from
someone else(reliable email).
 Web spoofing: Attacker tricks web
browser into communicating with a
different web server than the user
intended.
IP Spoofing
A technique used to gain unauthorized access to computers,
whereby the intruder sends messages to a computer with an
IP address indicating that the message is coming from a
trusted host
trusted host B
Intruder
A
C
IP Datagram
• The job of IP is to route and send a packet to the packet's destination.
• IP provides no guarantee , for the packets it tries to deliver.
• IP is the internet layer protocol.
Options and Padding
Destination Address
Total Length
Fragment Offset
Header ChecksumTime to Live Protocol
Identification
Type of Service
Flags
Version IHL
Source Address
0 16 31
TCP Header
0 16 31
Source Port Destination Port
Sequence Number
Acknowledgement Number
Window
Urgent Pointer
Options and Padding
Checksum
FlagsReservedData
Offset
TCP provides reliable and guaranteed delivery of packets.
IP Spoofing Mechanism
Attacker selects a host (target/victim)
Identify host that has trust relation with target
Trusted host is impersonated(tcp seq. no. copied)
Attacker successfully connects to the server
Attacker executes commands & Controls system
Types of IP spoofing Attacks
 Blind Spoofing Attack
 Non-Blind Spoofing Attack
 Man In The Middle Attack
 Denial of Service (DOS) Attack
Usually the attacker does not have access to the reply.
e.g.
Host C sends an IP datagram with the address of some other host (Host A)
as the source address to Host B. Attacked host (B) replies to the legitimate
host (A)
1. Blind Spoofing
2. Non-Blind Spoofing
Takes place when the attacker is on the same subnet as the
victim. This allows the attacker to sniff packets making the next
sequence number available to him.
In these attacks, a malicious party intercepts a legitimate communication
between two friendly parties. The malicious host then controls the flow of
communication and can eliminate or alter the information sent by one of the
original participants without the knowledge of either the original sender or
the recipient.
If an attacker controls a gateway that is in the delivery route, he
can
• intercept / block / delay traffic
• sniff the traffic
• modify traffic
3. Man In The MiddleAttack
4.Denial of Service Attack
•IP spoofing is always used in DOS attacks.
•Attackers are concerned with consuming bandwidth
and resources by
flooding the target with as many packets as possible in
a short amount of time.
DoS Attack
Server
Attacker Legitimate Users
Interweb
Fake IPs
Service
Requests
Flood of
Requests from
Attacker
Server queue full,
legitimate
requests get
dropped
Service
Requests
IP Spoofing Mechanism
Preventing IP spoofing
attacks
Filtering at the Router border:
• Main idea is to check the Source IP address and validate it.
• Look for invalid source IP addresses, and discard it.
Use cryptographic network protocols:
Transport Layer Security (TLS), Secure Shell (SSH), HTTP Secure
(HTTPS)
Disable Commands :
Prevent from attacks by not using address-based authentication.
Disable all the r* commands.
Empty out the /etc/hosts.equiv file.
Network Address Translation(NAT)
• Nat are used to alter the packet (address) as it passes over the network.
• It keeps tracks of the mangled/altered data as it retranslates it when
the reply packets are routed back
CONCLUSION
 IP Spoofing is an old Hacker trick that continues to
evolve.
 Will continue to represent a threat as long as each layer
continues to trust each other.
Any Questions ?
IP Spoofing

Mais conteúdo relacionado

Mais procurados (20)

Mobile security
Mobile securityMobile security
Mobile security
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
My ppt..priya
My ppt..priyaMy ppt..priya
My ppt..priya
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
Network security
Network securityNetwork security
Network security
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Spoofing
SpoofingSpoofing
Spoofing
 
Cryptography
CryptographyCryptography
Cryptography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
ip spoofing
ip spoofingip spoofing
ip spoofing
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Presentation1
Presentation1Presentation1
Presentation1
 
Cryptography
CryptographyCryptography
Cryptography
 
Spoofing
SpoofingSpoofing
Spoofing
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 

Semelhante a IP Spoofing (20)

Ip spoofing & types of attachs using it
Ip spoofing & types of attachs using itIp spoofing & types of attachs using it
Ip spoofing & types of attachs using it
 
spoofing.ppt
spoofing.pptspoofing.ppt
spoofing.ppt
 
Lecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptxLecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptx
 
Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention
 
ip spoofing
ip spoofingip spoofing
ip spoofing
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Network Security
Network SecurityNetwork Security
Network Security
 
PPIT Lecture 20
PPIT Lecture 20PPIT Lecture 20
PPIT Lecture 20
 
342_IP_Spoofing.pptx
342_IP_Spoofing.pptx342_IP_Spoofing.pptx
342_IP_Spoofing.pptx
 
Ip spoofing attacks
Ip spoofing attacksIp spoofing attacks
Ip spoofing attacks
 
IP spoofing .pptx
IP spoofing .pptxIP spoofing .pptx
IP spoofing .pptx
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
 
Network Security
Network SecurityNetwork Security
Network Security
 
COUNTERMEASURE TOOL - CARAPACE FOR NETWORK SECURITY
COUNTERMEASURE TOOL - CARAPACE FOR NETWORK SECURITYCOUNTERMEASURE TOOL - CARAPACE FOR NETWORK SECURITY
COUNTERMEASURE TOOL - CARAPACE FOR NETWORK SECURITY
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasures
 
DDoS-bdNOG
DDoS-bdNOGDDoS-bdNOG
DDoS-bdNOG
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

IP Spoofing

  • 2. Precap…  What is spoofing  Types of spoofing  Ip spoofing  Ip spoofing attacks  Prevention of Ip spoofing  Ip spoofing applications  Reference
  • 3. Spoofing  It is a situation in which one person or program successfully masquerades as another by falsifying information/data and thereby gaining an illegitimate advantage.
  • 4. Types of spoofing  IP spoofing: Attacker uses IP address of another computer to acquire information or gain access from another network.  Email spoofing: Attacker sends email but makes it appear to come from someone else(reliable email).  Web spoofing: Attacker tricks web browser into communicating with a different web server than the user intended.
  • 5. IP Spoofing A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host trusted host B Intruder A C
  • 6. IP Datagram • The job of IP is to route and send a packet to the packet's destination. • IP provides no guarantee , for the packets it tries to deliver. • IP is the internet layer protocol. Options and Padding Destination Address Total Length Fragment Offset Header ChecksumTime to Live Protocol Identification Type of Service Flags Version IHL Source Address 0 16 31
  • 7. TCP Header 0 16 31 Source Port Destination Port Sequence Number Acknowledgement Number Window Urgent Pointer Options and Padding Checksum FlagsReservedData Offset TCP provides reliable and guaranteed delivery of packets.
  • 8. IP Spoofing Mechanism Attacker selects a host (target/victim) Identify host that has trust relation with target Trusted host is impersonated(tcp seq. no. copied) Attacker successfully connects to the server Attacker executes commands & Controls system
  • 9. Types of IP spoofing Attacks  Blind Spoofing Attack  Non-Blind Spoofing Attack  Man In The Middle Attack  Denial of Service (DOS) Attack
  • 10. Usually the attacker does not have access to the reply. e.g. Host C sends an IP datagram with the address of some other host (Host A) as the source address to Host B. Attacked host (B) replies to the legitimate host (A) 1. Blind Spoofing
  • 11. 2. Non-Blind Spoofing Takes place when the attacker is on the same subnet as the victim. This allows the attacker to sniff packets making the next sequence number available to him.
  • 12. In these attacks, a malicious party intercepts a legitimate communication between two friendly parties. The malicious host then controls the flow of communication and can eliminate or alter the information sent by one of the original participants without the knowledge of either the original sender or the recipient. If an attacker controls a gateway that is in the delivery route, he can • intercept / block / delay traffic • sniff the traffic • modify traffic 3. Man In The MiddleAttack
  • 13. 4.Denial of Service Attack •IP spoofing is always used in DOS attacks. •Attackers are concerned with consuming bandwidth and resources by flooding the target with as many packets as possible in a short amount of time.
  • 14. DoS Attack Server Attacker Legitimate Users Interweb Fake IPs Service Requests Flood of Requests from Attacker Server queue full, legitimate requests get dropped Service Requests IP Spoofing Mechanism
  • 15. Preventing IP spoofing attacks Filtering at the Router border: • Main idea is to check the Source IP address and validate it. • Look for invalid source IP addresses, and discard it. Use cryptographic network protocols: Transport Layer Security (TLS), Secure Shell (SSH), HTTP Secure (HTTPS) Disable Commands : Prevent from attacks by not using address-based authentication. Disable all the r* commands. Empty out the /etc/hosts.equiv file.
  • 16. Network Address Translation(NAT) • Nat are used to alter the packet (address) as it passes over the network. • It keeps tracks of the mangled/altered data as it retranslates it when the reply packets are routed back
  • 17. CONCLUSION  IP Spoofing is an old Hacker trick that continues to evolve.  Will continue to represent a threat as long as each layer continues to trust each other.