What Is IP Spoofing and How Does It Work?
An IP (Internet
Protocol) address is the address that reveals the identity of your
Internet service provider and your personal Internet connection. The
address can be viewed during Internet browsing and in all of your
correspondences that you send.
IP spoofing
hides your IP address by creating IP packets that contain bogus IP
addresses in an effort to impersonate other connections and hide your
identity when you send information. IP spoofing is a common method that is used by spammers and scammers to mislead others on the origin of the information they send.
How IP Spoofing Works?
The Internet Protocol or IP is used for sending and receiving data over the Internet and computers that are connected to a network. Each packet of information that is sent is identified by the IP address which reveals the source of the information.
When IP spoofing
is used the information that is revealed on the source of the data is
not the real source of the information. Instead the source contains a
bogus IP address that makes the information packet look like it was sent
by the person with that IP address. If you try to respond to the
information, it will be sent to a bogus IP address unless the hacker
decides to redirect the information to a real IP address.
Why IP Spoofing is Used?
IP spoofing
is used to commit criminal activity online and to breach network
security. Hackers use IP spoofing so they do not get caught spamming and
to perpetrate denial of service attacks. These are attacks that involve
massive amounts of information being sent to computers over a network
in an effort to crash the entire network. The hacker does not get caught
because the origin of the messages cannot be determined due to the
bogus IP address.
IP spoofing is
also used by hackers to breach network security measures by using a
bogus IP address that mirrors one of the addresses on the network. This
eliminates the need for the hacker to provide a user name and password
to log onto the network.
It is possible
to protect a network against IP spoofing by using Ingress filtering
which uses packets to filter the inbound traffic. The system has the
capability to determine if the packets are coming from within the system
or from an outside source.
Transmission
Control Protocols can also be deployed through a number sequence that is
used to create a secure connection to other systems. This method can be
enhanced by disconnecting the source routing on the network to prevent
hackers from exploiting some of the spoofing capabilities.
DOWNLOAD pdf Introduction to IP Spoofing
IP spoofing tools
Tools - For Windows
Engage Packet Builder v2.20 - Scriptable packet builder for Windows
HPing v2.0.0 - Command-line oriented TCP/IP packet assembler/analyzer
Nemesis v1.4 beta3 - Command-line portable IP stack
Colasoft Packet Builder v1.0 - Tool for creating custom network packets
Colasoft Packet Player v1.1 - Packet replay tool
PacketExcalibur v1.0.2 - Graphical and scriptable network packet engine
Scapy v2.0.0.10 - Interactive packet manipulation tool
Spoofer v0.5 - IP Spoofing Tester
NMap v4.68 - Utility for network exploration and security auditing
Tools - For Linux
LSRscan v1.0 - Loose Source Route Scanning Tool
Scapy v2.0.0.10 - Interactive packet manipulation tool
Sendip v2.5-1 - Send completely arbitrary packets out over the network
Spoofer v0.5 - IP Spoofing Tester
Yersina v0.7.1 - Tool to exploit weakenesses in different network protocols
HPing v2.0.0 - Command-line TCP/IP packet assembler/analyzer
IRPAS v0.8 - Internetwork Routing Portocol Attack Suite (File2Cable etc.)
LSRtunnel v0.2.1 - Loose Source Route Tunneling Tool
Nemesis v1.4 beta3 - Command-line portable IP stack
NMap v4.76 - Utility for network exploration and security auditing
PacketExcalibur v1.0.2 - Graphical and scriptable network packet engine
DOWNLOAD TORRENT LINK
DOWNLOAD MIRROR LINK
No comments:
Post a Comment