SlideShare a Scribd company logo
Submitted to:
Mr. Mahesh Joshi
Submitted by:
Rajat Gupta
11EGJIT041
 Spoofing is a security attack that allows an adversary
to observe and modify all web pages sent to the
victim's machine, and observe all information entered
into forms by the victim.
 The attacker can observe and modify all web pages
and form submissions, even when the browser's
"secure connection" indicator is lit. The user sees no
indication that anything is wrong.
 After your browser has been fooled, the spoofed web
server can send you fake web pages or prompt you
to provide personal information such as login Id,
password, or even credit card or bank account
numbers.
 IP Spoof
 E-mail Spoof
 Web Spoofing
 Non Technical Spoof
 The creation of IP packets with a forged source. The purpose of it is to
conceal the identity of the sender or impersonating another computing
system.
 Some upper layer protocols provide their own defense against IP
spoofing.
 For example, TCP uses sequence numbers negotiate with the remote
machine to ensure that the arriving packets are part of an established
connection. Since the attacker normally cant see any reply packets,
he has to guess the sequence number in order to hijack the
connection.
rajat_ppt
 IP spoofing is almost always used in what is currently one of
the most difficult attacks to defend against – denial of service
attacks, or DoS. Since hrackers are concerned only with
consuming bandwidth and resources, they need not worry
about properly completing handshakes and transactions.
Rather, they wish to flood the victim with as many packets as
possible in a short amount of time. In order to prolong the
effectiveness of the attack, they spoof source IP addresses
to make tracing and stopping the DoS as difficult as possible.
When multiple compromised hosts are participating in the
attack, all sending spoofed traffic; it is very challenging to
quickly block traffic.
 E-mail spoofing is the forgery of an e-mail header so
that the message appears to have originated from
someone or somewhere other than the actual source.
rajat_ppt
 It has happened that the media printed false
stories based on spoofed e-mails.
 In October 2013, an e-mail which looked like
it was from the Swedish company Fingerprint
Cards was sent to a news agency, saying
that Samsung offered to purchase the
company. The news spread and the stock
exchange rate surged by 50%. But the e-
mail was from someone else.
 Don’t click links in emails instead always copy and
paste, or even better manually type the URL in.
 When entering personal or sensitive information, verify
the URL is as you expect, and the site’s SSL certificate
matches that URL.
 Look at the IP information of the email header. If an
email originated from inside your network, the sender
should have very similar IP address.
 Pretending to be a legitimate site
 Attacker creates convincing but false copy of the
site
 Stealing personal information such as login ID,
password, credit card, bank account, and much
more. aka Phishing attack
 False Web looks and feels like the real one
 Attacker controls the false web by surveillance
 Modifying integrity of the data from the victims
rajat_ppt
 These non-computer based techniques are
commonly referred to as social engineering. This can
be as simple as the attacker calling someone on the
phone saying that he is a certain person.
rajat_ppt
 Web spoofing is increasing at a rapid pace
› According to a study by Gartner Research
› Two million users gave such information to
spoofed web sites.
› About $1.2 billion direct losses to U.S. Bank and
credit card issuers in 2003
› And about $400 million to $1 billion losses from
the victims
Under Information Technology (Amendment) Act, 2008,
Section 66-D and Section 417, 419 & 465 of Indian
Penal Code, 1860 also applicable. Spoofing offence is
cognizable, bailable, compoundable with permission of
the court before which the prosecution of such offence
is pending and triable by any magistrate.
 WASHINGTON (Reuters) - High-frequency trader
Michael Coscia was charged with manipulating
commodity futures prices in the first U.S. federal
criminal prosecution of the practice of "spoofing," the
Justice Department said on Thursday.
 Coscia and his high-speed trading firm, Panther Energy
Trading, were fined $3.1 million by regulators in the
United States and Britain in July 2013 for market
manipulation and ordered to disgorge $2.7 million in
profits.
 It was the first criminal federal prosecution for
'spoofing' - creating the false impression of
market demand by rapidly placing orders and
then canceling them - which is explicitly banned
by the 2010 Dodd-Frank Wall Street reform act.
 "In August 2011, Coscia began a high-frequency
trading strategy in which he entered large-volume
orders that he intended to immediately cancel
before they could (be) filled by other traders," the
Department of Justice said.
 "By entering large orders that he ... canceled
before other traders could fill them, Coscia
made a profit by buying 14 contracts at 14288
ticks and selling them at 14289 ticks less than
one second later," the Department said.
 Futures markets, regulated by the Commodity
Futures Trading Commission, are a common
hunting ground for high-speed traders, and the
agency is probing the sector for any breaches.
 Follow a three part strategy:
 Disable JavaScript in your browser so the attacker will be
unable to hide the evidence of the attack;
 Make sure your browser’s location line is always visible;
 Pay attention to the URLs displayed on your browser’s
location line, making sure they always point to the server
you think you are connected to.
 We should remain updated in this fields.
 Daily there will be new challenges as the
hackers seek out weakness and vulnerabilities
in our systems.
 ANY QUERIES???
rajat_ppt

More Related Content

DOCX
Credit card hackers are here
PDF
A Survey Paper on Identity Theft in the Internet
PPTX
Phising a Threat to Network Security
PPTX
Phishing--The Entire Story of a Dark World
PPTX
Hacking phishing
PPTX
Seminar
PPTX
Cyber fraud a threat to E commerce
PPTX
Phishing
Credit card hackers are here
A Survey Paper on Identity Theft in the Internet
Phising a Threat to Network Security
Phishing--The Entire Story of a Dark World
Hacking phishing
Seminar
Cyber fraud a threat to E commerce
Phishing

What's hot (19)

PPT
P H I S H I N G
PPTX
What is Phishing and How can you Avoid it?
PPTX
Topshop potential threats
PPT
Phishing
PPTX
Phishing techniques
PDF
Asto card into
PPT
Phishing
PPT
Phishing
PPTX
Phishing attack, with SSL Encryption and HTTPS Working
PPTX
Phishing
PPTX
ELECTRONIC FRAUD TACTICS
PPT
Phishing: Swiming with the sharks
PPT
Identity Theft business
PPTX
Phishing
PPT
Strategies to handle Phishing attacks
PPT
ICT-phishing
PPTX
Internet fraud #scichallenge2017
 
PPT
e-Fraud ppt
PPTX
Different Types of Phishing Attacks
P H I S H I N G
What is Phishing and How can you Avoid it?
Topshop potential threats
Phishing
Phishing techniques
Asto card into
Phishing
Phishing
Phishing attack, with SSL Encryption and HTTPS Working
Phishing
ELECTRONIC FRAUD TACTICS
Phishing: Swiming with the sharks
Identity Theft business
Phishing
Strategies to handle Phishing attacks
ICT-phishing
Internet fraud #scichallenge2017
 
e-Fraud ppt
Different Types of Phishing Attacks
Ad

Viewers also liked (20)

PPTX
Introduction to Managing Cancer Living Meaningfully (CALM)
PDF
01 Mid-term Assignment - Christmas Land Project_khawar_v3
PPT
Portafolio virtua lalbertaponte
PPTX
El valor de la escucha
DOCX
Mu0013 hr audit
PPTX
Characters
DOCX
Mk0016 advertising management and sales
DOCX
Mb0050 research methodology
PDF
FlexDealer Automotive Digital Marketing Agency Presentation
DOCX
Mf0011 mergers & acquisitions
DOCX
ACC 491 Week 4 Learning Team Assignment Apollo Shoes Case Assignment (1) 2015...
DOCX
Mk0018 international marketing
PDF
Luyen viet tieng thai
DOCX
Mi0035 computer networks
PPSX
Under ground dams design
PDF
Projektverzögerungen - Welche Verteidigungsstrategien gibt es gegen Verzugver...
PDF
Board Comunicação Integrada
DOCX
Mk0018 international marketing
PDF
Gratis schnittmuster 06-59_44
PPTX
Construction companies in qatar
Introduction to Managing Cancer Living Meaningfully (CALM)
01 Mid-term Assignment - Christmas Land Project_khawar_v3
Portafolio virtua lalbertaponte
El valor de la escucha
Mu0013 hr audit
Characters
Mk0016 advertising management and sales
Mb0050 research methodology
FlexDealer Automotive Digital Marketing Agency Presentation
Mf0011 mergers & acquisitions
ACC 491 Week 4 Learning Team Assignment Apollo Shoes Case Assignment (1) 2015...
Mk0018 international marketing
Luyen viet tieng thai
Mi0035 computer networks
Under ground dams design
Projektverzögerungen - Welche Verteidigungsstrategien gibt es gegen Verzugver...
Board Comunicação Integrada
Mk0018 international marketing
Gratis schnittmuster 06-59_44
Construction companies in qatar
Ad

Similar to rajat_ppt (20)

PDF
ccs12-18022310494mghmgmyy3 (1).pdf
PPTX
Cyber Crime and Security
PDF
IT Sample Paper
PPTX
cyber crime.pptx
PDF
Edu 03 assingment
DOCX
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
PDF
Databreach forecast
PDF
A Guide to Internet Security For Businesses- Business.com
PPTX
Web spoofing hacking
PPT
Cyber crime
PDF
Phish phry operation
PDF
Phishing.pdf
DOCX
Preventing Internet Fraud By Preventing Identity Theft
PDF
The Current State of Cybercrime 2014
 
PDF
A Review on Antiphishing Framework
PPTX
Cyber Crime
PPTX
PPT FOR CYBER SECURITY AND FORENSICS MICRO PROJECT
PDF
A Contextual Framework For Combating Identity Theft
PPTX
Disadvantages of-i ct-woww
ccs12-18022310494mghmgmyy3 (1).pdf
Cyber Crime and Security
IT Sample Paper
cyber crime.pptx
Edu 03 assingment
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Databreach forecast
A Guide to Internet Security For Businesses- Business.com
Web spoofing hacking
Cyber crime
Phish phry operation
Phishing.pdf
Preventing Internet Fraud By Preventing Identity Theft
The Current State of Cybercrime 2014
 
A Review on Antiphishing Framework
Cyber Crime
PPT FOR CYBER SECURITY AND FORENSICS MICRO PROJECT
A Contextual Framework For Combating Identity Theft
Disadvantages of-i ct-woww

rajat_ppt

  • 1. Submitted to: Mr. Mahesh Joshi Submitted by: Rajat Gupta 11EGJIT041
  • 2.  Spoofing is a security attack that allows an adversary to observe and modify all web pages sent to the victim's machine, and observe all information entered into forms by the victim.  The attacker can observe and modify all web pages and form submissions, even when the browser's "secure connection" indicator is lit. The user sees no indication that anything is wrong.  After your browser has been fooled, the spoofed web server can send you fake web pages or prompt you to provide personal information such as login Id, password, or even credit card or bank account numbers.
  • 3.  IP Spoof  E-mail Spoof  Web Spoofing  Non Technical Spoof
  • 4.  The creation of IP packets with a forged source. The purpose of it is to conceal the identity of the sender or impersonating another computing system.  Some upper layer protocols provide their own defense against IP spoofing.  For example, TCP uses sequence numbers negotiate with the remote machine to ensure that the arriving packets are part of an established connection. Since the attacker normally cant see any reply packets, he has to guess the sequence number in order to hijack the connection.
  • 6.  IP spoofing is almost always used in what is currently one of the most difficult attacks to defend against – denial of service attacks, or DoS. Since hrackers are concerned only with consuming bandwidth and resources, they need not worry about properly completing handshakes and transactions. Rather, they wish to flood the victim with as many packets as possible in a short amount of time. In order to prolong the effectiveness of the attack, they spoof source IP addresses to make tracing and stopping the DoS as difficult as possible. When multiple compromised hosts are participating in the attack, all sending spoofed traffic; it is very challenging to quickly block traffic.
  • 7.  E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.
  • 9.  It has happened that the media printed false stories based on spoofed e-mails.  In October 2013, an e-mail which looked like it was from the Swedish company Fingerprint Cards was sent to a news agency, saying that Samsung offered to purchase the company. The news spread and the stock exchange rate surged by 50%. But the e- mail was from someone else.
  • 10.  Don’t click links in emails instead always copy and paste, or even better manually type the URL in.  When entering personal or sensitive information, verify the URL is as you expect, and the site’s SSL certificate matches that URL.  Look at the IP information of the email header. If an email originated from inside your network, the sender should have very similar IP address.
  • 11.  Pretending to be a legitimate site  Attacker creates convincing but false copy of the site  Stealing personal information such as login ID, password, credit card, bank account, and much more. aka Phishing attack  False Web looks and feels like the real one  Attacker controls the false web by surveillance  Modifying integrity of the data from the victims
  • 13.  These non-computer based techniques are commonly referred to as social engineering. This can be as simple as the attacker calling someone on the phone saying that he is a certain person.
  • 15.  Web spoofing is increasing at a rapid pace › According to a study by Gartner Research › Two million users gave such information to spoofed web sites. › About $1.2 billion direct losses to U.S. Bank and credit card issuers in 2003 › And about $400 million to $1 billion losses from the victims
  • 16. Under Information Technology (Amendment) Act, 2008, Section 66-D and Section 417, 419 & 465 of Indian Penal Code, 1860 also applicable. Spoofing offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.
  • 17.  WASHINGTON (Reuters) - High-frequency trader Michael Coscia was charged with manipulating commodity futures prices in the first U.S. federal criminal prosecution of the practice of "spoofing," the Justice Department said on Thursday.  Coscia and his high-speed trading firm, Panther Energy Trading, were fined $3.1 million by regulators in the United States and Britain in July 2013 for market manipulation and ordered to disgorge $2.7 million in profits.
  • 18.  It was the first criminal federal prosecution for 'spoofing' - creating the false impression of market demand by rapidly placing orders and then canceling them - which is explicitly banned by the 2010 Dodd-Frank Wall Street reform act.  "In August 2011, Coscia began a high-frequency trading strategy in which he entered large-volume orders that he intended to immediately cancel before they could (be) filled by other traders," the Department of Justice said.
  • 19.  "By entering large orders that he ... canceled before other traders could fill them, Coscia made a profit by buying 14 contracts at 14288 ticks and selling them at 14289 ticks less than one second later," the Department said.  Futures markets, regulated by the Commodity Futures Trading Commission, are a common hunting ground for high-speed traders, and the agency is probing the sector for any breaches.
  • 20.  Follow a three part strategy:  Disable JavaScript in your browser so the attacker will be unable to hide the evidence of the attack;  Make sure your browser’s location line is always visible;  Pay attention to the URLs displayed on your browser’s location line, making sure they always point to the server you think you are connected to.
  • 21.  We should remain updated in this fields.  Daily there will be new challenges as the hackers seek out weakness and vulnerabilities in our systems.