PresentationOnIP Spoofing
SpoofingIs a situation in which One person or program  Successfully inserts false Or misleading information in e-mail or Netnews headers.Also known as header forgery.
overviewTCP/IP-in brief
IP spoofing            Basic overview            IP spoofing-How it works           Examples of spoofing attacks                 Mitnick attack                 Session Hijack                 Dos attackDefending against the threat
Conclusion          TCP/IPGeneral use of term describes the architecture upon which the Interweb is built.
TCP and IP are specific protocols whithin that architecture.     TCP/IP AppilicationTransportTCPIPInterwebNetworkAccessPhysical
IPIP is the internet layer protocol.
Does not guarantee delivery or ordering only does its best to packets from a source address to a destination address.IP address are used to express the source and destination.
IP assumes that each address is unique whithin the network.TCPTCP is the transport layer protocol.
It guarantee delivery and ordering,but relies upon IP to move                     packets  proper destination.
Port number are used to express source and destination.
Destination port is assumed to be awaiting packets of data.IP SpoofingBasically, IP spoofing is lying about an IP address.
Normally, the source address is incorrect.
Lying about the source lets an attacker assume a new identity.
Because the source address is not the same as the attacker’s address,  any replies generated by
the destination will not be sent to the attacker.IP SpoofingBlind and non blind spoofing.
Attacker must have an alternate way to spy on traffic/predict                                          response.
To maintain a connection,Attacker must adhere to protocol requirements.IP Spoofing-how it works!!IP spoofing used to take control of a session.
Attacker normally within a LAN/on the communication path between server and client.
Not blind,since the attacker can see traffic from both server and client.Example of spoofing attacksMitnick Attack

More Related Content

PPT
I P S P O O F I N G
PPTX
Ip spoofing ppt
PPT
Ipspoofing
PPTX
Ip Spoofing
PPTX
My ppt..priya
PPTX
ip spoofing
PPTX
IP Spoofing
I P S P O O F I N G
Ip spoofing ppt
Ipspoofing
Ip Spoofing
My ppt..priya
ip spoofing
IP Spoofing

What's hot (20)

PPTX
Ip Spoofing
PDF
Internet Security
PPTX
Spoofing Techniques
PPTX
Network security
PPTX
TCP and UDP
PPTX
OSI reference model
PPT
Network Security
PPTX
Network Security
PPTX
IP Address - IPv4 & IPv6
PDF
Ip spoofing attacks
PPT
Ip Spoofing
PPT
ip spoofing
PPTX
Man in The Middle Attack
PPTX
Network security
PDF
IPSec (Internet Protocol Security) - PART 1
PPTX
Internet Key Exchange Protocol
PDF
Ip spoofing & types of attachs using it
PPTX
Application layer
PDF
Network security - OSI Security Architecture
PPT
Email security
Ip Spoofing
Internet Security
Spoofing Techniques
Network security
TCP and UDP
OSI reference model
Network Security
Network Security
IP Address - IPv4 & IPv6
Ip spoofing attacks
Ip Spoofing
ip spoofing
Man in The Middle Attack
Network security
IPSec (Internet Protocol Security) - PART 1
Internet Key Exchange Protocol
Ip spoofing & types of attachs using it
Application layer
Network security - OSI Security Architecture
Email security
Ad

Viewers also liked (20)

PPT
Himanshupptx
PPTX
Cybercrimes
PDF
Security problems in TCP/IP
PPTX
Spoofing Attacks حملات جعل هویت
PDF
BasepaperControlling IP Spoofing through Interdomain Packet Filters
PDF
IP spoofing attacks & defence
PPT
Tcp
PDF
A Novel IP Traceback Scheme for Spoofing Attack
PDF
Introduction to TCP/IP
PPTX
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
PPT
PDF
Proposed Methods of IP Spoofing Detection & Prevention
PPT
TCP/IP Basics
PPT
Osi , tcp/ip protocol and Addressing
PPT
FEGTS IP training - TCP/IP Introduction
DOC
Ip spoofing (seminar report)
PPTX
Protocols and the TCP/IP Protocol Suite
PDF
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
PPT
More on Tcp/Ip
KEY
Network infrastructure - TCP/IP
Himanshupptx
Cybercrimes
Security problems in TCP/IP
Spoofing Attacks حملات جعل هویت
BasepaperControlling IP Spoofing through Interdomain Packet Filters
IP spoofing attacks & defence
Tcp
A Novel IP Traceback Scheme for Spoofing Attack
Introduction to TCP/IP
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Proposed Methods of IP Spoofing Detection & Prevention
TCP/IP Basics
Osi , tcp/ip protocol and Addressing
FEGTS IP training - TCP/IP Introduction
Ip spoofing (seminar report)
Protocols and the TCP/IP Protocol Suite
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
More on Tcp/Ip
Network infrastructure - TCP/IP
Ad

Similar to Presentation1 (20)

PPTX
IP Spoofiaaaaaaaaaaaaaaaaaaaang ppt.pptx
PPT
EnggRoom_jjwjejsjsjjCode_IP Spoofing.ppt
PPT
IP Spoofing gtsshjkjjw hythahwikj sjahw.ppt
DOC
Sudheer tech seminor
PPTX
Lecture 7 Attacker and there tools.pptx
PDF
Module 10 (session hijacking)
PPTX
Keshav tiwari 20803001_TCP Session Hijacking.pptx
DOC
Efficient packet marking for large scale ip trace back(synopsis)
PPT
Hacking Cisco
PDF
12 types of DDoS attacks
PPT
spoofing.ppt
PPTX
342_IP_Spoofing.pptx
DOCX
Network Security
PPTX
IP spoofing .pptx
PPT
Spoofing
PDF
Ceh v5 module 10 session hijacking
PPTX
Introduction to the Ethical hacking.pptx
PDF
Cryptography and network security.
PDF
Network Security & Attacks
IP Spoofiaaaaaaaaaaaaaaaaaaaang ppt.pptx
EnggRoom_jjwjejsjsjjCode_IP Spoofing.ppt
IP Spoofing gtsshjkjjw hythahwikj sjahw.ppt
Sudheer tech seminor
Lecture 7 Attacker and there tools.pptx
Module 10 (session hijacking)
Keshav tiwari 20803001_TCP Session Hijacking.pptx
Efficient packet marking for large scale ip trace back(synopsis)
Hacking Cisco
12 types of DDoS attacks
spoofing.ppt
342_IP_Spoofing.pptx
Network Security
IP spoofing .pptx
Spoofing
Ceh v5 module 10 session hijacking
Introduction to the Ethical hacking.pptx
Cryptography and network security.
Network Security & Attacks

Recently uploaded (20)

PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
Empowerment Technology for Senior High School Guide
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
advance database management system book.pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
TNA_Presentation-1-Final(SAVE)) (1).pptx
Paper A Mock Exam 9_ Attempt review.pdf.
Cambridge-Practice-Tests-for-IELTS-12.docx
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Chinmaya Tiranga quiz Grand Finale.pdf
Empowerment Technology for Senior High School Guide
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Share_Module_2_Power_conflict_and_negotiation.pptx
AI-driven educational solutions for real-life interventions in the Philippine...
Virtual and Augmented Reality in Current Scenario
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
LDMMIA Reiki Yoga Finals Review Spring Summer
advance database management system book.pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
B.Sc. DS Unit 2 Software Engineering.pptx
Environmental Education MCQ BD2EE - Share Source.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf

Presentation1