What is spoofing and their types explained
Q. What is spoofing?
A spoofing attack is a situation in which one personal or program successfully masquerades as another by falsifying data, there by gaining an allegitimate advantage.
A spoofing attack is when a malicious party impersonater another device or user on a network in order to launch attacks against network hosts, steal data, spread malware or bypass access controls
Types of spoofing
1.TCP & IP Spoofing
2. Caller ID Spoofing
3. E-mail spoofing
4. GPS spoofing
5. MAC address spoofing
6. DNS spoofing
7. protocol spoofing
8. website spoofing
1. TCP/IP SPOOFING
Many of the protocols in the TCP/IP suite do not provide machanisms for authenticating the source or destination of a message, they are thus vulnerable to spoofing attacks when extra precautions are not taken by applications to verify the identity of the sending or receiving host.IP spoofing and ARP spoofing in particular may be used to leverage man-in-the-middle attacks against hosts on a computer network. spoofing attacks which take advantage of TCP/IP suite protocols may be mitigatedwith the use of firewalls capable of deep packet inspection or by taking measures to verify the identity of the sender or receipient of a message
2. CALLER ID SPOOFING
Public telephone networks often provide caller ID information which includes the caller's name and number, with each call. However, some technologies (especially in voice one IP(VOIP) networks)allow callers to forge caller ID information and present false names and numbers. Gateway between networks that allow such spoofing and other public network then forward that false information. since spoofed cells can originate from other countries, the laws in the receiver's country may not apply to the caller, this limits law effectiness against the use of spoofed caller ID information to further a scam.
3. E-MAIL SPOOFING
The sender information shown in emails (the "form" field) can be spoofed easily. this technique in commonly. used by spammers to hide the origin of their e-mails and leads to problems such as misdirected bouncers
(i.e.:- E-mail spam backscatter)
E-mail address spoofing is done in quite the same way as writing a forged return address using snail mail. as long as the letter fits thjethe protocol. (i.e.:- stamp, postal code) the SMTP protocol will send the message. it can be done using a mail server with talnet.
4. GPS SPOOFING
A GPS spoofing attack attempts to device a GPS receiver by broadcasting incorrect GPS signals. structed to resemble a set of normal GPS signals, or by rebroadcasting genuine signals captured elsewhere or at a different time. these spoofed signals may be modified in suich a way as to cause the receiver to estimate its actually is, or to be located where it is but at a differnt time, as determined by the attacker. one common form of a GPS spoofing attack, commonly termed a carry observed by the target receiver the power of the counterfeit signals is then gradually unereased and drawn awy form the genuine signals.
5. DNS SPOOFING( like farming)
Normally, a networked computer user a DNS server provided by an internet service provider(ISP) or the computer user's organization. DNS servers are used is an organization's network to improve resolution response performance by coching previously obtained query results poisoning attacks an a single DNS server can affect the users serviced directly compromised server or those serviced indirectly by its downstream server(s) if applicable.
This attack can be used to redirect users from a website to another site of the attacker's choosing. for examples, an attacker spoofs the IP address DNS entries for a target website on a given DNS server and replaces them with thee IP address of a server under their control. the attacker then creater files on the server under their control with names matching those on the target server. these files usually contain malicious content, such as computer worms or viruses. A user whose computer has referenced the poisoned DNS server get tricked into accepting content coming from non-authentic server and unknowingly downloads the malicious content. this technique can also be used for phishing attacks, where a fake version of a geniune website is created to gather persional detail such as bank and credit/debit card details.
6. WEBSITE SPOOFING
Website spoofing is the act of creating a website, as a hoax, with the intention of misleading readers that the website has been created by a different person or organization. Normally, the spoof website will adopt the design of the target website and sometimes has a similar URL. A more sophisticated attack results in an attacker creating a "shadpow copy" of the world wide web by having all of the victim's traffic go through the attacker's machine, cousing the attacker to obtain the victim's sensitive information.
7. MAC ADDRESS SPOOFING
A media access control address(MAC Address) of a computer is a unique identifier assigned to network interfaces for communications at the data link layer of a network segment. MAC addresses are used as a network address for most 1EEE 802 network technologies, including ethernet andwifi. Ligically, MAC addresses are used in the media access control protocol sublayer of the OSI reference model.
MAC addresses are most often assigned by the manufacture of a network interfacce controller (NIC) and are stored in its hardware, such as the cars's read only memory or some other firmware mechanism. if assigned by the manufactures a mac addresses usually encodes the manufactuser's registred identification number and may be reffered to as the burned in address(BIA). it may also be known as an ethernet hardware address(EHA). hardware address or physical address (Not to be confused with a memory physical address). this can be constrasted to a programmed address, where the host device issues commands to the NIC to use an arbitrary address.
Hope, You learned something new!
Author:
Comments
Post a Comment