IP Spoofing Example - IP Spoofing - IP Spoofing Tutorial



What is IP Spoofing ?

  • IP spoofing is a technique used to gain unauthorized access to computers, where by the attacker send messages to a computer with a foreign IP address indicating that the message is coming from a trusted host.
  • Attacker puts an internal, or trusted, IP address as its source. The access control device saw the IP address as it is trusted and then lets it through.
  • IP spoofing occurs when a hacker inside or outside a network impersonates the conversations of a trusted computer.

Note : This article is written only for educational purposes. The contents should not be useful for any illegal purposes.

 IP Spoofing

Learn Ethical Hacking - Ethical Hacking tutorial - IP Spoofing - Ethical Hacking examples - Ethical Hacking programs

  • There are two general techniques are used during IP spoofing:
    • A hacker uses an IP address that is within the range of trusted IP addresses.
    • A hacker uses an authorized external IP address that is trusted.
  • Other uses for IP spoofing:
    • IP spoofing is usually limited to the injection of malicious data or commands into an existing stream of data.
    • A hacker changes the routing tables to point to the spoofed IP address, then the hacker can receive all the network packets that are addressed to the spoofed address and reply just as any trusted user can.
 How to spoof IP

Learn Ethical Hacking - Ethical Hacking tutorial - How to spoof IP - Ethical Hacking examples - Ethical Hacking programs

Why IP Spoofing is easy?

  • Problem with the Routers.
  • Routers look at Destination addresses only.
  • Authentication based on Source addresses only.
  • To change source address field in IP header field is easy.

Spoofing Attacks:

  • There are a few variations on the types of attacks that using IP spoofing.

Spoofing is classified into :-

1.Non-Blind Spoofing

  • This attack takes place when the attacker is on the same subnet as the target that could see sequence and acknowledgement of packets.
  • Using this spoofing to interfere with a connection that sends packets along with their own subnet.
 Spoofing Attack

Learn Ethical Hacking - Ethical Hacking tutorial - Spoofing Attack - Ethical Hacking examples - Ethical Hacking programs

 IP Spoofing Attack

Learn Ethical Hacking - Ethical Hacking tutorial - IP Spoofing Attack - Ethical Hacking examples - Ethical Hacking programs

2. Blind spoofing

  • This attack may take place from outside where sequence and acknowledgement numbers are unreachable.
  • Attackers usually send several packets to the target machine in order to sample sequence numbers, which is double in older days .
  • Using these spoofing to interfere with a connection (or creating one), that does not send packets along with the cable.
 IP Spoofing Example

Learn Ethical Hacking - Ethical Hacking tutorial - IP Spoofing Example - Ethical Hacking examples - Ethical Hacking programs

Man in the Middle Attack

  • These type is also called as connection hijacking.
  • In this attack, a malicious party intercepts a legitimate communication between two hosts to controls the flow of communication and to eliminate or alter the information sent by one of the original participants without their knowledge.
 What is IP Spoofing Attack

Learn Ethical Hacking - Ethical Hacking tutorial - What is IP Spoofing Attack - Ethical Hacking examples - Ethical Hacking programs

SMURF Attack

  • Send ICMP ping packet with spoofed IP source address to a LAN which will broadcast to all hosts on the LAN.
  • Each host will send a reply packet to the spoofed IP address leading to denial of service.
 Spoofing in Network

Learn Ethical Hacking - Ethical Hacking tutorial - Spoofing in Network - Ethical Hacking examples - Ethical Hacking programs

IP Spoofing Step by Step Procedure

Step 1 : Download any best VPN softwares from internet.

Step 2 : For example downloaded Hide.me VPN Software which looks better and its free. Download the software and install it.

Step 3 : Click “Enable VPN” button to enable the Virtual private network and your ip address will change.

 Spoofing Protection

Learn Ethical Hacking - Ethical Hacking tutorial - Spoofing Protection - Ethical Hacking examples - Ethical Hacking programs

Step 4 : Click on “Change” button in the right side of the window to set the country location for the IP Address.

Step 5 : Goto Cmd Prompt and type the command "ipconfig" then we will get the latest IP Address.

 How to prevent IP Spoofing

Learn Ethical Hacking - Ethical Hacking tutorial - How to prevent IP Spoofing - Ethical Hacking examples - Ethical Hacking programs

Step 6: On Click “Details” button in the left side of the window. We are able to see the location is changed to Netherlands. But our actual location is India.

 How does Spoofing works

Learn Ethical Hacking - Ethical Hacking tutorial - How does Spoofing works - Ethical Hacking examples - Ethical Hacking programs

  • This is how, the attacker will change the IP Address while doing illegal activity through online.
  • Using this kind of techniques, the attackers will hack the servers .


Related Searches to IP Spoofing Example - IP Spoofing - IP Spoofing Tutorial