Spoofing is the use of phishing techniques, generally for malicious purposes.
By spoofing the creating TCP / IP frames using a spoofed IP address; The idea of this attack - at least the idea - is very simple: from his computer, a hacker simulates the identity of another machine on the network to gain access to resources from a third system that has established some kind of trust based on the name or the IP address of the impersonated host. And since the trust rings based on these easily falsifiable characteristics are still too abundant (we only have to think about the r- commands, the NFS accesses, or the protection of network services by means of TCP Wrapper), the spoofing continues being in currently a non-trivial, but feasible attack against any type of organization.
|
In the specific case of IP spoofing, this basically consists of replace the source IP address of a TCP / IP packet with another IP address that you want to impersonate. This is generally achieved thanks to programs designed precisely for this purpose and can be used for any protocol within TCP / IP such as ICMP, UDP or TCP.
Mail Spoofing is the spoofing of the email address of other people or entities. This technique is widely used for sending hoax emails as the perfect supplement to phishing and spam. To protect yourself, you should check the sender's IP (to find out if this IP really belongs to the entity indicated in the message) and the address of the SMTP server used.
|
Cybercriminals are always up to date when it comes to new online attack techniques. One of the most popular lately is spoofing. But do you know what it is or what it consists of? We will tell you.
Video by: ComputerHoy.com
No Comment