{"id":39031,"date":"2019-01-24T15:41:42","date_gmt":"2019-01-24T21:41:42","guid":{"rendered":"https:\/\/webirix.com\/?p=39031"},"modified":"2019-01-24T15:41:42","modified_gmt":"2019-01-24T21:41:42","slug":"que-es-el-spoofing","status":"publish","type":"post","link":"https:\/\/webirix.com\/en\/que-es-el-spoofing\/","title":{"rendered":"What is Spoofing?"},"content":{"rendered":"<p>Spoofing is the use of phishing techniques, generally for malicious purposes.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/encrypted-tbn0.gstatic.com\/images?q=tbn:ANd9GcS_vgM5HUVmbsYKod0tLUieM-i1Vu4KaOtFzWPRt8u5yiV8Y9th\" alt=\"Resultado de imagen para spoofing\" \/><\/p>\n<div id=\"pagina\">\n<div id=\"contenido\">\n<table border=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"top\">\n<div id=\"subcontenido\">\n<div id=\"detalle\">By spoofing the\u00a0<b>creating TCP \/ IP frames using a spoofed IP address<\/b>; The idea of this attack - at least the idea - is very simple: from his computer, a hacker simulates the identity of another machine on the network to gain access to resources from a third system that has established some kind of trust based on the name or the IP address of the impersonated host. And since the trust rings based on these easily falsifiable characteristics are still too abundant (we only have to think about the r- commands, the NFS accesses, or the protection of network services by means of TCP Wrapper), the spoofing continues being in currently a non-trivial, but feasible attack against any type of organization.<\/div>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<p>In the specific case of IP spoofing, this basically consists of\u00a0<strong>replace the source IP address of a TCP \/ IP packet with another IP address that you want to impersonate.\u00a0<\/strong>This is generally achieved thanks to programs designed precisely for this purpose and can be used for any protocol within TCP \/ IP such as ICMP, UDP or TCP.<\/p>\n<div id=\"pagina\">\n<div id=\"contenido\">\n<table border=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"top\">\n<div>\n<div>\n<div><\/div>\n<\/div>\n<\/div>\n<div id=\"subcontenido\">\n<div id=\"detalle\">El Mail Spoofing es la suplantaci\u00f3n de la direcci\u00f3n de correo electr\u00f3nico de otras personas o entidades. Esta t\u00e9cnica es usada con asiduidad para el env\u00edo de mensajes de correo electr\u00f3nico hoax como suplemento perfecto para el uso de suplantaci\u00f3n de identidad y para &#8220;spam&#8221;. Para protegerse se deber\u00eda comprobar la IP del remitente (para averiguar si realmente esa IP pertenece a la entidad que indica en el mensaje) y la direcci\u00f3n del servidor SMTP utilizado.<\/div>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<p><iframe loading=\"lazy\" title=\"\u00bfQu\u00e9 es Spoofing?\" width=\"1140\" height=\"641\" src=\"https:\/\/www.youtube.com\/embed\/7vhLJe02oHM?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p>Cybercriminals are always up to date when it comes to new online attack techniques. One of the most popular lately is spoofing. But do you know what it is or what it consists of? We will tell you.<\/p>\n<p>Video by: ComputerHoy.com<\/p>","protected":false},"excerpt":{"rendered":"<p>Spoofing is the use of phishing techniques, generally for malicious purposes. Spoofing is known as the creation of TCP \/ IP frames using a spoofed IP address; The idea of this attack - at least the idea - is very simple: from his computer, a pirate simulates the identity of another ...<\/p>","protected":false},"author":25,"featured_media":39033,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2027,2259],"tags":[],"class_list":["post-39031","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad","category-spam"],"jetpack_featured_media_url":"https:\/\/webirix.com\/wp-content\/uploads\/2019\/01\/spoofing.jpg","_links":{"self":[{"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/posts\/39031","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/comments?post=39031"}],"version-history":[{"count":2,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/posts\/39031\/revisions"}],"predecessor-version":[{"id":39035,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/posts\/39031\/revisions\/39035"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/media\/39033"}],"wp:attachment":[{"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/media?parent=39031"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/categories?post=39031"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/tags?post=39031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}