The web spoofing describes an Internet security attack that could endanger the privacy of World Wide Web users and the integrity of their data. The attack can becarried out on today's systems, endangering users of the most common Web browsers.Web spoofing allows an attacker to create a "shadow copy" of the entire World WideWeb. Accesses to the shadow Web are funneled through the attacker’smachine, allowing the attacker to monitor all of the victim's activities including any passwords or account numbers the victim enters. The attacker can also cause false or misleading data to be sent to Web servers in the victim's name, or to the victim in thename of any Web server. In short, the attacker observes and controls everything thevictim does on the Web. First, the attacker causes a browser window to becreated on the victim's machine, with some of the normal status and menu informationreplaced by identical-looking components supplied by the attacker. Then, the attacker causes all Web pages destined for the victim's machine to be routed through theattacker's server. On the attacker’s server, the pages are rewritten in such a way that their appearance does not change at all, but any actions taken by the victim would be logged by the attacker. In addition, any attempt by the victim to load a new page would cause thenewly-loaded page to be routed through the attacker's server, so the attack wouldcontinue on the new page.
1 Introduction2 Previous works3 Types of spoofing3.1 IP spoofing3.2 Email spoofing3.3 Web spoofing3.4 URL spoofing3.5 IDN spoofing3.6 DNS spoofing3.7 Proxy spoofing4 Thread Model and Attack 5 How web spoofing works?6 Spoofing the whole page7 How do the attacks works8 Completing the illusion8.1 The status line8.2 The location line8.3 Viewing the document source9 Countermeasures9.1 Disable java script9.2 Customization9.3 Disable pop-up windows9.4 Long-term solutions10 Future spoofing works11 Implications11.1What are the current risk to the web user?12 Conclusions13 References
Please join StudyMode to read the full document