Spoofing Attack

A spoofing attack, in computer security terms, refers to a situation in which one person or program is able to masquerade successfully as another.
 
An example from cryptography is the man in the middle attack, in which an attacker spoofs Alice into believing he's Bob, and spoofs Bob into believing he's Alice, thus gaining access to all messages in both directions without the trouble of any cryptanalytic effort.
The attacker must monitor the packets sent from Alice to Bob and then guess the sequence number of the packets. Then the attacker knocks out Alice with a SYN attack and injects his own packets, claiming to have the address of Alice. Alice's firewall can defend against spoof attacks when it has been configured with knowledge of all the IP addresses connected to each of its interfaces. It can then detect a spoofed packet if it arrives from an interface that is not known to be connected to that interface.
  • 0 Користувачі, які знайшли це корисним
Ця відповідь Вам допомогла?

Related Articles

Sub Domain

In the Domain Name Server (DNS) hierarchy, a subdomain is a domain that is part of a larger...

Search Engine

Internet search engines are special sites on the Web that are designed to help people find...

SSL (Secure Sockets Layer)

The SSL (Secure Sockets Layer) is a commonly-used protocol for managing the security of a message...

S-HTTP (Secure HTTP)

S-HTTP (Secure HTTP) is an extension to the Hypertext Transfer Protocol (HTTP) that allows the...

Shell

Better known as command shell, it is the command processor interface. The command processor is...