SlideShare une entreprise Scribd logo
1  sur  19
IP SPOOFING
Precap…
 What is spoofing
 Types of spoofing
 Ip spoofing
 Ip spoofing attacks
 Prevention of Ip spoofing
 Ip spoofing applications
 Reference
Spoofing
 It is a situation in which one person or program successfully masquerades
as another by falsifying information/data and thereby gaining an
illegitimate advantage.
Types of spoofing
 IP spoofing: Attacker uses IP address
of another computer to acquire
information or gain access from
another network.
 Email spoofing: Attacker sends email
but makes it appear to come from
someone else(reliable email).
 Web spoofing: Attacker tricks web
browser into communicating with a
different web server than the user
intended.
IP Spoofing
A technique used to gain unauthorized access to computers,
whereby the intruder sends messages to a computer with an
IP address indicating that the message is coming from a
trusted host
trusted host B
Intruder
A
C
IP Datagram
• The job of IP is to route and send a packet to the packet's destination.
• IP provides no guarantee , for the packets it tries to deliver.
• IP is the internet layer protocol.
Options and Padding
Destination Address
Total Length
Fragment Offset
Header ChecksumTime to Live Protocol
Identification
Type of Service
Flags
Version IHL
Source Address
0 16 31
TCP Header
0 16 31
Source Port Destination Port
Sequence Number
Acknowledgement Number
Window
Urgent Pointer
Options and Padding
Checksum
FlagsReservedData
Offset
TCP provides reliable and guaranteed delivery of packets.
IP Spoofing Mechanism
Attacker selects a host (target/victim)
Identify host that has trust relation with target
Trusted host is impersonated(tcp seq. no. copied)
Attacker successfully connects to the server
Attacker executes commands & Controls system
Types of IP spoofing Attacks
 Blind Spoofing Attack
 Non-Blind Spoofing Attack
 Man In The Middle Attack
 Denial of Service (DOS) Attack
Usually the attacker does not have access to the reply.
e.g.
Host C sends an IP datagram with the address of some other host (Host A)
as the source address to Host B. Attacked host (B) replies to the legitimate
host (A)
1. Blind Spoofing
2. Non-Blind Spoofing
Takes place when the attacker is on the same subnet as the
victim. This allows the attacker to sniff packets making the next
sequence number available to him.
In these attacks, a malicious party intercepts a legitimate communication
between two friendly parties. The malicious host then controls the flow of
communication and can eliminate or alter the information sent by one of the
original participants without the knowledge of either the original sender or
the recipient.
If an attacker controls a gateway that is in the delivery route, he
can
• intercept / block / delay traffic
• sniff the traffic
• modify traffic
3. Man In The MiddleAttack
4.Denial of Service Attack
•IP spoofing is always used in DOS attacks.
•Attackers are concerned with consuming bandwidth
and resources by
flooding the target with as many packets as possible in
a short amount of time.
DoS Attack
Server
Attacker Legitimate Users
Interweb
Fake IPs
Service
Requests
Flood of
Requests from
Attacker
Server queue full,
legitimate
requests get
dropped
Service
Requests
IP Spoofing Mechanism
Preventing IP spoofing
attacks
Filtering at the Router border:
• Main idea is to check the Source IP address and validate it.
• Look for invalid source IP addresses, and discard it.
Use cryptographic network protocols:
Transport Layer Security (TLS), Secure Shell (SSH), HTTP Secure
(HTTPS)
Disable Commands :
Prevent from attacks by not using address-based authentication.
Disable all the r* commands.
Empty out the /etc/hosts.equiv file.
Network Address Translation(NAT)
• Nat are used to alter the packet (address) as it passes over the network.
• It keeps tracks of the mangled/altered data as it retranslates it when
the reply packets are routed back
CONCLUSION
 IP Spoofing is an old Hacker trick that continues to
evolve.
 Will continue to represent a threat as long as each layer
continues to trust each other.
Any Questions ?
IP Spoofing

Contenu connexe

Tendances

Tendances (20)

Spoofing
SpoofingSpoofing
Spoofing
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
 
Network security
Network securityNetwork security
Network security
 
Ip spoofing attacks
Ip spoofing attacksIp spoofing attacks
Ip spoofing attacks
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Spoofing
SpoofingSpoofing
Spoofing
 
ip spoofing
ip spoofingip spoofing
ip spoofing
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Jini technology ppt
Jini technology pptJini technology ppt
Jini technology ppt
 

Similaire à IP Spoofing

Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention
International Journal of Science and Research (IJSR)
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
leminhvuong
 

Similaire à IP Spoofing (20)

Ip spoofing & types of attachs using it
Ip spoofing & types of attachs using itIp spoofing & types of attachs using it
Ip spoofing & types of attachs using it
 
spoofing.ppt
spoofing.pptspoofing.ppt
spoofing.ppt
 
Lecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptxLecture 7 Attacker and there tools.pptx
Lecture 7 Attacker and there tools.pptx
 
Ipspoofing
IpspoofingIpspoofing
Ipspoofing
 
Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Network Security
Network SecurityNetwork Security
Network Security
 
PPIT Lecture 20
PPIT Lecture 20PPIT Lecture 20
PPIT Lecture 20
 
342_IP_Spoofing.pptx
342_IP_Spoofing.pptx342_IP_Spoofing.pptx
342_IP_Spoofing.pptx
 
IP spoofing .pptx
IP spoofing .pptxIP spoofing .pptx
IP spoofing .pptx
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
 
Network Security
Network SecurityNetwork Security
Network Security
 
COUNTERMEASURE TOOL - CARAPACE FOR NETWORK SECURITY
COUNTERMEASURE TOOL - CARAPACE FOR NETWORK SECURITYCOUNTERMEASURE TOOL - CARAPACE FOR NETWORK SECURITY
COUNTERMEASURE TOOL - CARAPACE FOR NETWORK SECURITY
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasures
 
DDoS-bdNOG
DDoS-bdNOGDDoS-bdNOG
DDoS-bdNOG
 
security problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suitesecurity problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suite
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

IP Spoofing

  • 2. Precap…  What is spoofing  Types of spoofing  Ip spoofing  Ip spoofing attacks  Prevention of Ip spoofing  Ip spoofing applications  Reference
  • 3. Spoofing  It is a situation in which one person or program successfully masquerades as another by falsifying information/data and thereby gaining an illegitimate advantage.
  • 4. Types of spoofing  IP spoofing: Attacker uses IP address of another computer to acquire information or gain access from another network.  Email spoofing: Attacker sends email but makes it appear to come from someone else(reliable email).  Web spoofing: Attacker tricks web browser into communicating with a different web server than the user intended.
  • 5. IP Spoofing A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host trusted host B Intruder A C
  • 6. IP Datagram • The job of IP is to route and send a packet to the packet's destination. • IP provides no guarantee , for the packets it tries to deliver. • IP is the internet layer protocol. Options and Padding Destination Address Total Length Fragment Offset Header ChecksumTime to Live Protocol Identification Type of Service Flags Version IHL Source Address 0 16 31
  • 7. TCP Header 0 16 31 Source Port Destination Port Sequence Number Acknowledgement Number Window Urgent Pointer Options and Padding Checksum FlagsReservedData Offset TCP provides reliable and guaranteed delivery of packets.
  • 8. IP Spoofing Mechanism Attacker selects a host (target/victim) Identify host that has trust relation with target Trusted host is impersonated(tcp seq. no. copied) Attacker successfully connects to the server Attacker executes commands & Controls system
  • 9. Types of IP spoofing Attacks  Blind Spoofing Attack  Non-Blind Spoofing Attack  Man In The Middle Attack  Denial of Service (DOS) Attack
  • 10. Usually the attacker does not have access to the reply. e.g. Host C sends an IP datagram with the address of some other host (Host A) as the source address to Host B. Attacked host (B) replies to the legitimate host (A) 1. Blind Spoofing
  • 11. 2. Non-Blind Spoofing Takes place when the attacker is on the same subnet as the victim. This allows the attacker to sniff packets making the next sequence number available to him.
  • 12. In these attacks, a malicious party intercepts a legitimate communication between two friendly parties. The malicious host then controls the flow of communication and can eliminate or alter the information sent by one of the original participants without the knowledge of either the original sender or the recipient. If an attacker controls a gateway that is in the delivery route, he can • intercept / block / delay traffic • sniff the traffic • modify traffic 3. Man In The MiddleAttack
  • 13. 4.Denial of Service Attack •IP spoofing is always used in DOS attacks. •Attackers are concerned with consuming bandwidth and resources by flooding the target with as many packets as possible in a short amount of time.
  • 14. DoS Attack Server Attacker Legitimate Users Interweb Fake IPs Service Requests Flood of Requests from Attacker Server queue full, legitimate requests get dropped Service Requests IP Spoofing Mechanism
  • 15. Preventing IP spoofing attacks Filtering at the Router border: • Main idea is to check the Source IP address and validate it. • Look for invalid source IP addresses, and discard it. Use cryptographic network protocols: Transport Layer Security (TLS), Secure Shell (SSH), HTTP Secure (HTTPS) Disable Commands : Prevent from attacks by not using address-based authentication. Disable all the r* commands. Empty out the /etc/hosts.equiv file.
  • 16. Network Address Translation(NAT) • Nat are used to alter the packet (address) as it passes over the network. • It keeps tracks of the mangled/altered data as it retranslates it when the reply packets are routed back
  • 17. CONCLUSION  IP Spoofing is an old Hacker trick that continues to evolve.  Will continue to represent a threat as long as each layer continues to trust each other.