IP Spoofing
IP Spoofing
BY
ASHISH KUMAR
BT – IT
UNDER GUIDANCE OF
MRS.ASHA JYOTI
IP SPOOFING ?
• IP Spoofing is a technique used to gain
unauthorized access to computers.
– IP: Internet Protocol
– Spoofing: using somebody else’s information
• Exploits the trust relationships
• Intruder sends messages to a computer with
an IP address of a trusted host.
IP SPOOFING
WHY IP SPOOFING IS EASY ?
1. Non-blind spoofing :
2. Blind spoofing :
This attack may take place from outside
where sequence and acknowledgement
numbers are unreachable. Attackers
usually send several packets to the target
machine in order to sample sequence
numbers, which is doable in older days .
COTND…
• 4. SMURF ATTACK :
Send ICMP ping packet with spoofed IP
source address to a LAN which will
broadcast to all hosts on the LAN
Each host will send a reply packet to the
spoofed IP address leading to denial of
service
CONTD…
• SAT DSL
• NAT
• IP Masquerade
ADVANTAGES
• Multiple Servers :
Sometimes you want to change where
packets heading into your network will go.
Frequently this is because you have only
one IP address, but you want people to be
able to get into the boxes behind the one
with the `real' IP address.
ADVANTAGES
• Transparent Proxying :
• Blind to Replies :
A drawback to ip source address spoofing
is that reply packet will go back to the
spoofed ip address rather than to the
attacker. This is fine for many type of
attack packet. However in the scanning
attack as we will see next the attacker may
need to see replies .in such cases ,the
attacker can not use ip address spoofing .
DISADVANTAGE
• IP Spoofing, www.linuxgazette.com/issue63/sharma.html