5
Most read
Presented by:
Yousra 014
Zarafshan 018
Kinza 020
SPOOFING
DEFINITION OF SPOOFING
• The word "spoof" means to hoax, trick, or
deceive.
• This is typically done by hiding one's
identity or faking the identity of another
user on the Internet.
TYPES OF SPOOFING
• IP spoofing
• Web spoofing
• E-mail spoofing
IP SPOOFING
• The creation of IP packets with a forged
source.
• The purpose of it is to conceal the identity
of the sender or impersonating another
comput.ing system
IP SPOOFING
WEB SPOOFING
• It’s a security attack that allows an
adversary to observe and modify all web
pages send to the victim’s machine and
observe all information entered into forms
by the victim.
WEB SPOOFING VIDEO
DANGERS OF WEB SPOOFING
• After your brower has been fooled, the
spoofed web server can send you fake
web pages or prompt you to provide
personal information such as login id ,
password, or even credit card or bank
account number.
E-mail SPOOFING
• E-mail spoofing is the forgery of an e-mail
header so that the message appears to
have originated from someone or
somewhere other than the actual source.
E-MAIL SPOOFING VIDEO
THANK YOU

More Related Content

PPTX
Protecting Your Identity Online
PPTX
Internet Security IT
PPTX
You think you are safe online. Are You?
PPTX
Max secure mobile tab_security_ value prop - 1
PDF
EN_Corporates_Security
PPTX
PHISHING MAIL BY SAIKIRAN PANJALA
PPTX
How to Protect your Wi-Fi from Cyber Hackers
PDF
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)
Protecting Your Identity Online
Internet Security IT
You think you are safe online. Are You?
Max secure mobile tab_security_ value prop - 1
EN_Corporates_Security
PHISHING MAIL BY SAIKIRAN PANJALA
How to Protect your Wi-Fi from Cyber Hackers
A Survey of Threats in OS X and iOS(FFRI Monthly Research 201507)

What's hot (10)

PPTX
Surf smart
 
PPTX
Presentation on cyber crime
PPTX
Avoid the Hack
PPTX
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
PPTX
What is spear phishing ( cyber attack )
PDF
The top 10 security issues in web applications
PPTX
Seven Simple Steps to Online Security
PDF
Astricon 2016
PDF
Securing Mobile & Online Identity in the Cyber World
PPTX
ip spoofing by Ipshita Nandy
Surf smart
 
Presentation on cyber crime
Avoid the Hack
Hacker Đỗ Đậu Đỗ- Linh Hương- Huyền Thanh- Jenny Trần
What is spear phishing ( cyber attack )
The top 10 security issues in web applications
Seven Simple Steps to Online Security
Astricon 2016
Securing Mobile & Online Identity in the Cyber World
ip spoofing by Ipshita Nandy

Similar to Spoofing (20)

PPT
8 - IP Spoofing.ppt8 - IP Spoofing.ppt8 - IP Spoofing.ppt
PPTX
Webspoofing
PPTX
PPTX
PPTX
Web spoofing hacking
PDF
Spoofing Attack - Meaning, Working & Prevention Plan Explained | USCSI®
PPTX
Spoofing v2
PPTX
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
PPTX
Spoofing
PPT
Web spoofing (1)
PPTX
Spoofing Techniques
PPT
Spoofing
PPTX
Access Controls Attacks
PPT
Web spoofing
PPTX
Ip Spoofing
PPTX
Spoofing
PDF
Ip spoofing & types of attachs using it
PPTX
Ip spoofing ppt
PPTX
rajat_ppt
8 - IP Spoofing.ppt8 - IP Spoofing.ppt8 - IP Spoofing.ppt
Webspoofing
Web spoofing hacking
Spoofing Attack - Meaning, Working & Prevention Plan Explained | USCSI®
Spoofing v2
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Spoofing
Web spoofing (1)
Spoofing Techniques
Spoofing
Access Controls Attacks
Web spoofing
Ip Spoofing
Spoofing
Ip spoofing & types of attachs using it
Ip spoofing ppt
rajat_ppt

Recently uploaded (20)

PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
Journal of Dental Science - UDMY (2021).pdf
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PDF
advance database management system book.pdf
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PDF
semiconductor packaging in vlsi design fab
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PPTX
Education and Perspectives of Education.pptx
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
English Textual Question & Ans (12th Class).pdf
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
Hazard Identification & Risk Assessment .pdf
AI-driven educational solutions for real-life interventions in the Philippine...
Journal of Dental Science - UDMY (2021).pdf
Uderstanding digital marketing and marketing stratergie for engaging the digi...
advance database management system book.pdf
Share_Module_2_Power_conflict_and_negotiation.pptx
Unit 4 Computer Architecture Multicore Processor.pptx
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
semiconductor packaging in vlsi design fab
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
B.Sc. DS Unit 2 Software Engineering.pptx
Education and Perspectives of Education.pptx
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
Paper A Mock Exam 9_ Attempt review.pdf.
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
English Textual Question & Ans (12th Class).pdf
Cambridge-Practice-Tests-for-IELTS-12.docx
Hazard Identification & Risk Assessment .pdf

Spoofing

  • 1. Presented by: Yousra 014 Zarafshan 018 Kinza 020 SPOOFING
  • 2. DEFINITION OF SPOOFING • The word "spoof" means to hoax, trick, or deceive. • This is typically done by hiding one's identity or faking the identity of another user on the Internet.
  • 3. TYPES OF SPOOFING • IP spoofing • Web spoofing • E-mail spoofing
  • 4. IP SPOOFING • The creation of IP packets with a forged source. • The purpose of it is to conceal the identity of the sender or impersonating another comput.ing system
  • 6. WEB SPOOFING • It’s a security attack that allows an adversary to observe and modify all web pages send to the victim’s machine and observe all information entered into forms by the victim.
  • 8. DANGERS OF WEB SPOOFING • After your brower has been fooled, the spoofed web server can send you fake web pages or prompt you to provide personal information such as login id , password, or even credit card or bank account number.
  • 9. E-mail SPOOFING • E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.