Thursday, February 9, 2012

How is spoofing done?

An attacker uses a fake source address that does not represent the actual address of the packet. Spoofing may be used to hide the original source of an attack or to work around network access control lists (ACLs) that are in place to limit host access based on source address rules. Spoofing attacks differ from random scanning and other techniques used to ascertain holes in the system. Spoofing attacks occur only after a particular machine has been identified as vulnerable. By the time the attacker is ready to conduct a spoofing attack, he or she knows the target network is vulnerable and which machine is to be attacked.

No comments:

Post a Comment