Documente Academic
Documente Profesional
Documente Cultură
Background
The basic protocol for sending data over
the Internet network and many other
computer networks is the Internet Protocol
(IP). The protocol specifies that each IP
packet must have a header which contains
(among other things) the IP address of the
sender of the packet. The source IP
address is normally the address that the
packet was sent from, but the sender's
address in the header can be altered, so
that to the recipient it appears that the
packet came from another source.
Applications
IP address spoofing involving the use of a
trusted IP address can be used by network
intruders to overcome network security
measures, such as authentication based
on IP addresses. This type of attack is
most effective where trust relationships
exist between machines. For example, it is
common on some corporate networks to
have internal systems trust each other, so
that users can log in without a username
or password provided they are connecting
from another machine on the internal
network (and so must already be logged
in). By spoofing a connection from a
trusted machine, an attacker on the same
network may be able to access the target
machine without authentication.
Legitimate uses
The use of packets with a false source IP
address is not always evidence of
malicious intent. For example, in
performance testing of websites,
hundreds or even thousands of "vusers"
(virtual users) may be created, each
executing a test script against the website
under test, in order to simulate what will
happen when the system goes "live" and a
large number of users log on at once.
Since each user will normally have its own
IP address, commercial testing products
(such as HP LoadRunner, WebLOAD, and
others) can use IP spoofing, allowing each
user its own "return address" as well.
Services vulnerable to IP
spoofing
This section does not cite any sources.
Learn more
Upper layers
Other definitions
The term spoofing is also sometimes used
to refer to header forgery, the insertion of
false or misleading information in e-mail
or netnews headers. Falsified headers are
used to mislead the recipient, or network
applications, as to the origin of a
message. This is a common technique of
spammers and sporgers, who wish to
conceal the origin of their messages to
avoid being tracked.
See also
Egress filtering
Ingress filtering
Network address translation
Reverse path forwarding
RFC 1948 , Defending Against Sequence
Number Attacks, May 1996
Router (includes a list of manufacturers)
Spoofed URL
MAC Spoofing
References
1. Tanase, Matthew (March 10, 2003). "IP
Spoofing: An Introduction" . Symantec.
Retrieved September 25, 2015.
External links
ANA Spoofer Project: State of IP
Spoofing and Client Test
Retrieved from
"https://en.wikipedia.org/w/index.php?
title=IP_address_spoofing&oldid=882255547"