What Is IP Spoofing and How Does It Work?
An IP (Internet
 Protocol) address is the address that reveals the identity of your 
Internet service provider and your personal Internet connection. The 
address can be viewed during Internet browsing and in all of your 
correspondences that you send.
IP spoofing
 hides your IP address by creating IP packets that contain bogus IP 
addresses in an effort to impersonate other connections and hide your 
identity when you send information. IP spoofing is a common method that is used by spammers and scammers to mislead others on the origin of the information they send.
How IP Spoofing Works?
The Internet Protocol or IP is used for sending and receiving data over the Internet and computers that are connected to a network. Each packet of information that is sent is identified by the IP address which reveals the source of the information.
When IP spoofing
 is used the information that is revealed on the source of the data is 
not the real source of the information. Instead the source contains a 
bogus IP address that makes the information packet look like it was sent
 by the person with that IP address. If you try to respond to the 
information, it will be sent to a bogus IP address unless the hacker 
decides to redirect the information to a real IP address.
Why IP Spoofing is Used?
IP spoofing
 is used to commit criminal activity online and to breach network 
security. Hackers use IP spoofing so they do not get caught spamming and
 to perpetrate denial of service attacks. These are attacks that involve
 massive amounts of information being sent to computers over a network 
in an effort to crash the entire network. The hacker does not get caught
 because the origin of the messages cannot be determined due to the 
bogus IP address.
IP spoofing is 
also used by hackers to breach network security measures by using a 
bogus IP address that mirrors one of the addresses on the network. This 
eliminates the need for the hacker to provide a user name and password 
to log onto the network.
It is possible 
to protect a network against IP spoofing by using Ingress filtering 
which uses packets to filter the inbound traffic. The system has the 
capability to determine if the packets are coming from within the system
 or from an outside source.
Transmission 
Control Protocols can also be deployed through a number sequence that is
 used to create a secure connection to other systems. This method can be
 enhanced by disconnecting the source routing on the network to prevent 
hackers from exploiting some of the spoofing capabilities.
DOWNLOAD pdf Introduction to IP Spoofing
IP spoofing tools
Tools - For Windows
Engage Packet Builder v2.20 - Scriptable packet builder for Windows
HPing v2.0.0 - Command-line oriented TCP/IP packet assembler/analyzer
Nemesis v1.4 beta3 - Command-line portable IP stack
Colasoft Packet Builder v1.0 - Tool for creating custom network packets
Colasoft Packet Player v1.1 - Packet replay tool
PacketExcalibur v1.0.2 - Graphical and scriptable network packet engine
Scapy v2.0.0.10 - Interactive packet manipulation tool
Spoofer v0.5 - IP Spoofing Tester
NMap v4.68 - Utility for network exploration and security auditing
Tools - For Linux
LSRscan v1.0 - Loose Source Route Scanning Tool
Scapy v2.0.0.10 - Interactive packet manipulation tool
Sendip v2.5-1 - Send completely arbitrary packets out over the network
Spoofer v0.5 - IP Spoofing Tester
Yersina v0.7.1 - Tool to exploit weakenesses in different network protocols
HPing v2.0.0 - Command-line TCP/IP packet assembler/analyzer
IRPAS v0.8 - Internetwork Routing Portocol Attack Suite (File2Cable etc.)
LSRtunnel v0.2.1 - Loose Source Route Tunneling Tool
Nemesis v1.4 beta3 - Command-line portable IP stack
NMap v4.76 - Utility for network exploration and security auditing
PacketExcalibur v1.0.2 - Graphical and scriptable network packet engine
DOWNLOAD TORRENT LINK
DOWNLOAD MIRROR LINK

No comments:
Post a Comment