Preview

Spoofing Facts

Good Essays
Open Document
Open Document
433 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Spoofing Facts
Spoofing Facts
Spoofing is used to hide the true source of packets or redirect traffic to another location. Spoofing attacks:
• Use modified source and/or destination addresses in packets.
• Can include site spoofing that tricks users into revealing information.
Common methods of spoofing are listed in the table below:
Attack Description
IP spoofing IP spoofing changes the IP address information within a packet. It can be used to:
• Hide the origin of the attack by spoofing the source address.
• Amplify attacks by redirecting responses to a victim and overwhelming the victim with traffic.
MAC spoofing MAC spoofing is when an attacking device spoofs the MAC address of a valid host currently in the MAC address table of the switch. The switch then forwards frames destined for that valid host to the attacking device. This can be used to bypass:
• A wireless access point with MAC filtering on a wireless network.
• Router access control lists (ACLs).
• 802.1x port-based security.
ARP spoofing ARP spoofing (also known as ARP poisoning) uses spoofed ARP messages to associate a different MAC address with an IP address. ARP spoofing can be used to perform a man-in-the-middle attack as follows:
1. When an ARP request is sent by a client for the MAC address of a device, such as the default gateway router, the attacker's system responds to the ARP request with the MAC address of the attacker's system.
2. The client receives the spoofed ARP response and uses that MAC address when communicating with the destination host. For example, packets sent to the default gateway are sent instead to the attacker.
3. The attacker receives all traffic sent to the destination host. The attacker can then forward these packets on to the correct destination using its own MAC address as the source address.
ARP spoofing can also be used to perform Denial of Service (DoS) attacks by redirecting communications to fake or non-existent MAC addresses.
Countermeasures to

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt 2580 Project Part 2

    • 1249 Words
    • 5 Pages

    Bridges are networking devices that can connect 2 local area networks (LAN). A bridge can learn all of the MAC addresses on the network, and this is done during the bridges data gathering phase. Basically a bridge will receive the data and analyze the address. The bridge will then pass the data on to the correct address. The ports on a bridge are in and out, but they are smart ports with the ability to locate the address on the network.…

    • 1249 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    packet switching- The process of forwarding customer data in a WAN by looking at the header of the messages sent into the WAN by the customer and making a per-message (per-packet) decision as to where to forward each message.…

    • 445 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    You Decide- Sec572 Week 2

    • 577 Words
    • 3 Pages

    The concept of IP spoofing decreased due to the demise of the services they exploited, spoofing can still be used and needs to be addressed by all security administrators.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT1210 Chapter 5.2.6

    • 342 Words
    • 2 Pages

    Step 5: When the targeted device checks the Target Protocol Address, it will find a match and will generate an ARP reply message. It takes the Sender Hardware Address and the Sender Protocol Address fields from the ARP request message and uses these values for the Targeted Hardware Address and Targeted Protocol Address of the reply message.…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    Allows a network device to intercept and read each network packet that arrives in its entirety.…

    • 424 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    NT1210Uni5Lab5

    • 1370 Words
    • 4 Pages

    If two or more devices or computers share the same MAC address (including the last 24 bits in the MAC address), the switches will be confused and having a hard time as to which computer’s NIC should they forward the frames.…

    • 1370 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Is317 Lab #3 Questions

    • 430 Words
    • 2 Pages

    It traces the routes packets from the user to the target, it shows a packets hops to the target, and they target the host address.…

    • 430 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Sec 280 Week 1 Case Study

    • 408 Words
    • 2 Pages

    Ping sweeps are often used in combination with Port scans, similar process. Ping sweeps are used to see what targets are available on the network. For instance, we may be on a 192.168.1.0 vlan with only a few computers. The router or DHCP server will assign each machine with its own IP address in order by request, by doing this the IP address can get out of order. A Ping sweep of the IP range 192.168.1.1 – 192.168.1.99 would show the computers are currently on the network. Hackers do this to gain as much access as possible.…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT-241 Appendix G

    • 369 Words
    • 2 Pages

    Stands for Wired Equivalency Privacy. Uses 64 bit or 128 bit encryption. (including 24-bit IV)…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt2460 Unit 1 Assignment

    • 762 Words
    • 4 Pages

    If seen on the public internet, these packets cannot actually originate as claimed, or be delivered. However, certain reserved addresses can be routed using multicast, or on private networks, local links, or loopback interfaces, depending on which special-use range they fall within.…

    • 762 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Etterfilter compiles source filter files into binary filter files for ettercap to use. Ettercap can then do an ARP spoof on two targets. Now that a MITM attack is being performed, network traffic can be altered, which will then make changes to the victim machines without being logged into.…

    • 2570 Words
    • 11 Pages
    Good Essays
  • Good Essays

    Apt Spoofing Attack

    • 300 Words
    • 2 Pages

    Address Resolution Protocol (ARP) spoofing attack is a typical man-in-the middle attack where an attacker intercepts communication between two computers (Host B and Host A) by linking the victim's IP address with his MAC address. As a result, all the traffic that is meant for the victim, will reach the attacker first. The attacker eventually can steal sensitive information or prepare for more attacks. An attacker can intercept traffic through passive or active attacks. In a passive attack, an attacker eavesdrops or listen to traffic and this can reveal sensitive information, for example unencrypted clear text such as login usernames or identification and password. Active attack on the hand can be used to spoofing and more.…

    • 300 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Smurf attack is one of the most recent DoS strokes on hosts at the network level. In this case, a thug generates a huge amount of ICMP ping requests (datagram) with fake source addresses and sends them to the IP broadcast address of a network, that is, remote LANs broadcast addresses. Then the routers/switch (layer 3) broadcasts these requests to layer 2 broadcast addresses. Most of the hosts connected to the network will then send reply for each of the echo. Thus, the network is overwhelmed by fake echo multiplied by the number of connected hosts. Normally the attacker uses largest packets (up to Ethernet…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Good Essays

    We were given instruction to capture certain packets across our network. The first packet were given is ARP. What this protocol does is that it associates a MAC address with an IP address by broadcasting “who has this IP address”. It then waits for the response. The MAC address of the response is then stored in the ARP table for future references. Below in figure 1.3 is a capture of the ARP protocol from my…

    • 967 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Cognitive Hacking

    • 2741 Words
    • 11 Pages

    In this paper, we define a category of computer security exploits called "cognitive hacking." Loosely speaking, cognitive hacking refers to a computer or information system attack that relies on changing human users ' perceptions and corresponding behaviors in order to be successful. This is in contrast to denial of service (DOS) and other kinds of well-known attacks that operate solely within the computer and network infrastructure. Several cognitive hacking techniques are illustrated by example and a taxonomy for these types of attacks is developed. Technologies for preventing and mitigating the effects of cognitive hacking attacks are proposed as well.…

    • 2741 Words
    • 11 Pages
    Powerful Essays