SlideShare uma empresa Scribd logo
1 de 29
IP-SPOOFING




     By- Himanshu Chaurishiya
WHAT IS IP-SPOOFING ???



        IP       -> Internet Protocol..
        Spoofing -> Hiding..

   It is a trick played on servers to fool the target
computers into thinking that it is receiving data from
source other than the trusted host.

  This Attack is actually a Trust-Relationship
Exploitation.
REAL LIFE EXAMPLE TO
                                           B is on line
EXPLAIN WHAT IS
IP SPOOFING.

         A disguising his voice,making
         it sound more like that of B        C
  A
                              B

If we now,replace the 3 people by computers and change
the term “voice” with “IP-Address” then you would know
what we mean by IP-SPOOFING…
IP Packet Header
TCP Packet Header
THE 3-WAY HANDSHAKE ..


           SYN

           SYN,ACK

           ACK
CLIENT                        HOST
IP
SPOOFING
IP
SPOOFING
THE
       K
 ATTAC

1. Non-blind spoofing :

This attack takes place when the attacker is on the
same subnet as the target that could see sequence and
acknowledgement of packets.

                    SYN

   S                                         R
                    SYN,ACK


                                    ACK
                     A
2. Blind spoofing

This attack may take place from outside where sequence
and acknowledgement numbers are unreachable. Attackers
usually send several packets to the target machine in
order to figure out sequence numbers, which is easy to do
in older days. Since most OSs implement random sequence
number generation today, it becomes more difficult to
predict the sequence number accurately. If, however, the
sequence number was compromised, data could be sent to
the target.
3. Denial of Service Attack :

  IP spoofing is almost always used in denial of service
  attacks (DoS), in which attackers are concerned with
  consuming bandwidth & resources by flooding the target
  with as many packets as possible in a short amount of
  time.
4.Man in the Middle Attack

This is also called connection hijacking. In this attacks, a
malicious party intercepts a legitimate communication
between two hosts to controls the flow of communication
and to eliminate or alter the information sent by one of the
original participants without their knowledge.




   S                     A                    R
WHY IP SPOOFING IS EASY ?

•   Problem with the Routers.
•   Routers look at Destination addresses only.
•   Authentication based on Source addresses only.
•   To change source address field in IP header field is
    easy.
IO N
   E CT
DET

 Routing Methods

 • Ingress filtering
 • Egress filtering

 Non-Routing Methods

 • IP Identification Number
 • Flow Control
 • Packet Retransmission
 •Traceroute
Routing Method
Routers know IP addresses originate with which
network interface. If the router receives IP
Packets with external IP addresses on an internal
interface or vice versa its likely to be spoofed.

Filtering:

•Ingress filtering(inbound packets)-protect
org.from outside attacks.

•Egress filtering(outbound packets)-prevent
internal computers from being involved in Spoofing
Attack
Non-Routing


Active- verify that the packet was sent from
claimed source, Method validate case.

Passive- no such action, indicate packet was
spoofed.
Identification Number(ID)
   Detect IP Spoofed Packet,when attacker is on same
   Subnet as Target.
                            R
     S                          Detection as follows:
         Sen
             d   Pa c k
                       et
                                •ID value should be near the
                                Questionable packets.

                                •ID value must be greater
ID                              than the ID value in
values                          Questionable Packet.

                                •If its Spoofed there value
                                change rapidly.
Flow Control
S                R     • If the Packets = Spoofed,then
                       Sender =no recipient’s ACK
                       Packets,will not respond to flow
    AC                 control.
       K

                       •If the Recipient’s =no ACK
           ACK         Packets,Sender Should Stop After
                       the initial window size is exhausted.
 W.s.
     =
(exc I
    eed)
Contd..
    S                  R
          ACK              Another Way to Detect IP
                           Spoofing.

                 w=0       •We set W=0 ,in order to know
            ,ACK           Sender is receiving or not.
        SYN
                           •If W=0,and we get ACK with
          ACK              some Data ,it means it’s likely to
                           be Spoofed.
Packet Retransmission
S           R
    ACK         TCP uses sequence number to
                determine which Packets have been
    ReSYN       ACK.
                Method to Detect:
                •When Packet Receive with an ACK-
                number less then min expected,or
                greater than max expected,the
    ACK         Packet Drops and as a way to resyn.
                The connection,send a reply with min
                expected Ack-number is sent.
    RST         •After receiving ACK successfully
                next time sent RST in reply ,its
                spoofed.
Contd..
 FIREWALL

 Capture reply, and Prevent the internal host from
 seeing the reply ,and will Prevent an ACK-Storm .
Traceroute
   Traceroute tells number of
   hops to the true source.

   Detection is as follows

   •If the Firewall blocks UDP
   packets it will count the Hops
   to the firewall.

   •If the packet is spoofed the
   number of Hops increase.
   (monitored site more hops
   away than true ).
Backdoor
t iv e
    ve n e s
 Pre sur
  M ea


1.Packet Filtering

2.Firewall

3.Disable commands like Ping.

4.Encryption
Should arriving
                              packet be allowed
                            in? Departing packet
                                  let out?




internal network connected to Internet

Router filter packets-by-packets, decision to
forward/drop packets based on:
  --Source IP address, destination IP address.
  --TCP SYN and ACK bits.
Oh sure, Don’t
Our network   worry. We have
 is secure,       several
   right?        firewalls
CONCLUSION
IP-Spoofing is an exploitation of trust-based
relationship and can be curbed effectively if
proper measures are used. Understanding
how and why spoofing attacks are used
,combined with a few simple prevention
methods, can help protect networks from
these    malicious  cloaking   and    cracking
techniques.
Any
Queries?
THANK YOU !

Mais conteúdo relacionado

Mais procurados

Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing TechniquesRaza_Abidi
 
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many otherSpoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many otherPankaj Dubey
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackKaustubh Padwad
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief Historyprasenjeetd
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle AttackDeepak Upadhyay
 
Man In The Middle - Hacking Illustrated
Man In The Middle - Hacking IllustratedMan In The Middle - Hacking Illustrated
Man In The Middle - Hacking IllustratedInfoSec Institute
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin BishtNitin Bisht
 
Man in-the-middle attack(http)
Man in-the-middle attack(http)Man in-the-middle attack(http)
Man in-the-middle attack(http)Togis UAB Ltd
 
Ip spoofing attacks
Ip spoofing attacksIp spoofing attacks
Ip spoofing attacksApijay Kumar
 

Mais procurados (20)

Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
An introduction to denial of service attack
An introduction to denial of service attackAn introduction to denial of service attack
An introduction to denial of service attack
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many otherSpoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
DDOS Attack
DDOS Attack DDOS Attack
DDOS Attack
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
Man In The Middle - Hacking Illustrated
Man In The Middle - Hacking IllustratedMan In The Middle - Hacking Illustrated
Man In The Middle - Hacking Illustrated
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
 
Man in-the-middle attack(http)
Man in-the-middle attack(http)Man in-the-middle attack(http)
Man in-the-middle attack(http)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ip spoofing attacks
Ip spoofing attacksIp spoofing attacks
Ip spoofing attacks
 

Destaque

Ip spoofing (seminar report)
Ip spoofing (seminar report)Ip spoofing (seminar report)
Ip spoofing (seminar report)Rahul Polara
 
Spoofing
SpoofingSpoofing
SpoofingSanjeev
 
Security problems in TCP/IP
Security problems in TCP/IPSecurity problems in TCP/IP
Security problems in TCP/IPSukh Sandhu
 
Spoofing Attacks حملات جعل هویت
Spoofing Attacks حملات جعل هویت Spoofing Attacks حملات جعل هویت
Spoofing Attacks حملات جعل هویت Muhibullah Aman
 
IP spoofing attacks & defence
IP spoofing attacks & defenceIP spoofing attacks & defence
IP spoofing attacks & defencevisor999
 
BasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet FiltersBasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet Filtersbhasker nalaveli
 
A Novel IP Traceback Scheme for Spoofing Attack
A Novel IP Traceback Scheme for Spoofing AttackA Novel IP Traceback Scheme for Spoofing Attack
A Novel IP Traceback Scheme for Spoofing AttackIJAEMSJORNAL
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IPMichael Lamont
 
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacksKipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacksKipp Berdiansky
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing marwan aldulaimy
 
FEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionFEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionKae Hsu
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios
 

Destaque (20)

Ip spoofing (seminar report)
Ip spoofing (seminar report)Ip spoofing (seminar report)
Ip spoofing (seminar report)
 
ip spoofing
ip spoofingip spoofing
ip spoofing
 
Spoofing
SpoofingSpoofing
Spoofing
 
Security problems in TCP/IP
Security problems in TCP/IPSecurity problems in TCP/IP
Security problems in TCP/IP
 
Spoofing Attacks حملات جعل هویت
Spoofing Attacks حملات جعل هویت Spoofing Attacks حملات جعل هویت
Spoofing Attacks حملات جعل هویت
 
IP spoofing attacks & defence
IP spoofing attacks & defenceIP spoofing attacks & defence
IP spoofing attacks & defence
 
BasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet FiltersBasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet Filters
 
Tcp
TcpTcp
Tcp
 
A Novel IP Traceback Scheme for Spoofing Attack
A Novel IP Traceback Scheme for Spoofing AttackA Novel IP Traceback Scheme for Spoofing Attack
A Novel IP Traceback Scheme for Spoofing Attack
 
Spoofing
SpoofingSpoofing
Spoofing
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacksKipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
 
FEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionFEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP Introduction
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
 
More on Tcp/Ip
More on Tcp/IpMore on Tcp/Ip
More on Tcp/Ip
 

Semelhante a Himanshupptx

Ip spoofing & types of attachs using it
Ip spoofing & types of attachs using itIp spoofing & types of attachs using it
Ip spoofing & types of attachs using itRajesh Porwal
 
Hacking Cisco Networks and Countermeasures
Hacking Cisco Networks and CountermeasuresHacking Cisco Networks and Countermeasures
Hacking Cisco Networks and Countermeasuresdkaya
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYVinil Patel
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Mumbai Academisc
 
Asegúr@IT 7: Playing with Satellites 1.2
Asegúr@IT 7: Playing with Satellites 1.2Asegúr@IT 7: Playing with Satellites 1.2
Asegúr@IT 7: Playing with Satellites 1.2Chema Alonso
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LANArpit Suthar
 
26-security2.ppt
26-security2.ppt26-security2.ppt
26-security2.pptsumita02
 
26-security2.ppt
26-security2.ppt26-security2.ppt
26-security2.pptjepoy808
 
26-security2.ppt
26-security2.ppt26-security2.ppt
26-security2.pptanakorang28
 
Detection and analysis_of_syn_flood_ddos
Detection and analysis_of_syn_flood_ddosDetection and analysis_of_syn_flood_ddos
Detection and analysis_of_syn_flood_ddosOleh Stupak
 
Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANsIshraq Al Fataftah
 
Vulnerabilities in IP Protocols
Vulnerabilities in IP ProtocolsVulnerabilities in IP Protocols
Vulnerabilities in IP Protocolsbabak danyal
 
Zhiyun Qian-what leaves attacker hijacking USA Today site
Zhiyun Qian-what leaves attacker hijacking USA Today siteZhiyun Qian-what leaves attacker hijacking USA Today site
Zhiyun Qian-what leaves attacker hijacking USA Today siteGeekPwn Keen
 

Semelhante a Himanshupptx (20)

Ip spoofing & types of attachs using it
Ip spoofing & types of attachs using itIp spoofing & types of attachs using it
Ip spoofing & types of attachs using it
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
spoofing.ppt
spoofing.pptspoofing.ppt
spoofing.ppt
 
Hacking Cisco Networks and Countermeasures
Hacking Cisco Networks and CountermeasuresHacking Cisco Networks and Countermeasures
Hacking Cisco Networks and Countermeasures
 
Network security
Network securityNetwork security
Network security
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
26 security2
26 security226 security2
26 security2
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
vulnerabilities in IP.pdf
vulnerabilities in IP.pdfvulnerabilities in IP.pdf
vulnerabilities in IP.pdf
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)
 
Asegúr@IT 7: Playing with Satellites 1.2
Asegúr@IT 7: Playing with Satellites 1.2Asegúr@IT 7: Playing with Satellites 1.2
Asegúr@IT 7: Playing with Satellites 1.2
 
Security attacks
Security attacksSecurity attacks
Security attacks
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LAN
 
26-security2.ppt
26-security2.ppt26-security2.ppt
26-security2.ppt
 
26-security2.ppt
26-security2.ppt26-security2.ppt
26-security2.ppt
 
26-security2.ppt
26-security2.ppt26-security2.ppt
26-security2.ppt
 
Detection and analysis_of_syn_flood_ddos
Detection and analysis_of_syn_flood_ddosDetection and analysis_of_syn_flood_ddos
Detection and analysis_of_syn_flood_ddos
 
Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANs
 
Vulnerabilities in IP Protocols
Vulnerabilities in IP ProtocolsVulnerabilities in IP Protocols
Vulnerabilities in IP Protocols
 
Zhiyun Qian-what leaves attacker hijacking USA Today site
Zhiyun Qian-what leaves attacker hijacking USA Today siteZhiyun Qian-what leaves attacker hijacking USA Today site
Zhiyun Qian-what leaves attacker hijacking USA Today site
 

Mais de Himanshu Chaurishiya (6)

Ror
RorRor
Ror
 
Experiment1
Experiment1Experiment1
Experiment1
 
Web3
Web3Web3
Web3
 
909ab45j890
909ab45j890909ab45j890
909ab45j890
 
Ppt it act
Ppt it actPpt it act
Ppt it act
 
ONLINE COMPLAINT MANAGEMENT SYSTEM
ONLINE COMPLAINT MANAGEMENT SYSTEMONLINE COMPLAINT MANAGEMENT SYSTEM
ONLINE COMPLAINT MANAGEMENT SYSTEM
 

Último

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Último (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

Himanshupptx

  • 1. IP-SPOOFING By- Himanshu Chaurishiya
  • 2. WHAT IS IP-SPOOFING ??? IP -> Internet Protocol.. Spoofing -> Hiding.. It is a trick played on servers to fool the target computers into thinking that it is receiving data from source other than the trusted host. This Attack is actually a Trust-Relationship Exploitation.
  • 3. REAL LIFE EXAMPLE TO B is on line EXPLAIN WHAT IS IP SPOOFING. A disguising his voice,making it sound more like that of B C A B If we now,replace the 3 people by computers and change the term “voice” with “IP-Address” then you would know what we mean by IP-SPOOFING…
  • 6. THE 3-WAY HANDSHAKE .. SYN SYN,ACK ACK CLIENT HOST
  • 9. THE K ATTAC 1. Non-blind spoofing : This attack takes place when the attacker is on the same subnet as the target that could see sequence and acknowledgement of packets. SYN S R SYN,ACK ACK A
  • 10. 2. Blind spoofing This attack may take place from outside where sequence and acknowledgement numbers are unreachable. Attackers usually send several packets to the target machine in order to figure out sequence numbers, which is easy to do in older days. Since most OSs implement random sequence number generation today, it becomes more difficult to predict the sequence number accurately. If, however, the sequence number was compromised, data could be sent to the target.
  • 11. 3. Denial of Service Attack : IP spoofing is almost always used in denial of service attacks (DoS), in which attackers are concerned with consuming bandwidth & resources by flooding the target with as many packets as possible in a short amount of time.
  • 12. 4.Man in the Middle Attack This is also called connection hijacking. In this attacks, a malicious party intercepts a legitimate communication between two hosts to controls the flow of communication and to eliminate or alter the information sent by one of the original participants without their knowledge. S A R
  • 13. WHY IP SPOOFING IS EASY ? • Problem with the Routers. • Routers look at Destination addresses only. • Authentication based on Source addresses only. • To change source address field in IP header field is easy.
  • 14. IO N E CT DET Routing Methods • Ingress filtering • Egress filtering Non-Routing Methods • IP Identification Number • Flow Control • Packet Retransmission •Traceroute
  • 15. Routing Method Routers know IP addresses originate with which network interface. If the router receives IP Packets with external IP addresses on an internal interface or vice versa its likely to be spoofed. Filtering: •Ingress filtering(inbound packets)-protect org.from outside attacks. •Egress filtering(outbound packets)-prevent internal computers from being involved in Spoofing Attack
  • 16. Non-Routing Active- verify that the packet was sent from claimed source, Method validate case. Passive- no such action, indicate packet was spoofed.
  • 17. Identification Number(ID) Detect IP Spoofed Packet,when attacker is on same Subnet as Target. R S Detection as follows: Sen d Pa c k et •ID value should be near the Questionable packets. •ID value must be greater ID than the ID value in values Questionable Packet. •If its Spoofed there value change rapidly.
  • 18. Flow Control S R • If the Packets = Spoofed,then Sender =no recipient’s ACK Packets,will not respond to flow AC control. K •If the Recipient’s =no ACK ACK Packets,Sender Should Stop After the initial window size is exhausted. W.s. = (exc I eed)
  • 19. Contd.. S R ACK Another Way to Detect IP Spoofing. w=0 •We set W=0 ,in order to know ,ACK Sender is receiving or not. SYN •If W=0,and we get ACK with ACK some Data ,it means it’s likely to be Spoofed.
  • 20. Packet Retransmission S R ACK TCP uses sequence number to determine which Packets have been ReSYN ACK. Method to Detect: •When Packet Receive with an ACK- number less then min expected,or greater than max expected,the ACK Packet Drops and as a way to resyn. The connection,send a reply with min expected Ack-number is sent. RST •After receiving ACK successfully next time sent RST in reply ,its spoofed.
  • 21. Contd.. FIREWALL Capture reply, and Prevent the internal host from seeing the reply ,and will Prevent an ACK-Storm .
  • 22. Traceroute Traceroute tells number of hops to the true source. Detection is as follows •If the Firewall blocks UDP packets it will count the Hops to the firewall. •If the packet is spoofed the number of Hops increase. (monitored site more hops away than true ).
  • 24. t iv e ve n e s Pre sur M ea 1.Packet Filtering 2.Firewall 3.Disable commands like Ping. 4.Encryption
  • 25. Should arriving packet be allowed in? Departing packet let out? internal network connected to Internet Router filter packets-by-packets, decision to forward/drop packets based on: --Source IP address, destination IP address. --TCP SYN and ACK bits.
  • 26. Oh sure, Don’t Our network worry. We have is secure, several right? firewalls
  • 27. CONCLUSION IP-Spoofing is an exploitation of trust-based relationship and can be curbed effectively if proper measures are used. Understanding how and why spoofing attacks are used ,combined with a few simple prevention methods, can help protect networks from these malicious cloaking and cracking techniques.