ip spoofing ppt
TRANSCRIPT
![Page 1: Ip Spoofing Ppt](https://reader035.vdocument.in/reader035/viewer/2022071700/54474dcbb1af9f800a8b4df6/html5/thumbnails/1.jpg)
IP SpoofingIP Spoofing BYBY
R.seetharama raoR.seetharama rao
BT – ITBT – IT
UNDER GUIDANCE OFUNDER GUIDANCE OF
Mr.murtuza
![Page 2: Ip Spoofing Ppt](https://reader035.vdocument.in/reader035/viewer/2022071700/54474dcbb1af9f800a8b4df6/html5/thumbnails/2.jpg)
IP SPOOFING ?IP SPOOFING ?
• IP Spoofing is a technique used to gain IP Spoofing is a technique used to gain unauthorized access to computers.unauthorized access to computers.
– IP: Internet ProtocolIP: Internet Protocol
– Spoofing: using somebody else’s Spoofing: using somebody else’s informationinformation
• Exploits the trust relationshipsExploits the trust relationships
• Intruder sends messages to a computer with Intruder sends messages to a computer with an IP address of a trusted host.an IP address of a trusted host.
![Page 3: Ip Spoofing Ppt](https://reader035.vdocument.in/reader035/viewer/2022071700/54474dcbb1af9f800a8b4df6/html5/thumbnails/3.jpg)
IP SPOOFINGIP SPOOFING
![Page 4: Ip Spoofing Ppt](https://reader035.vdocument.in/reader035/viewer/2022071700/54474dcbb1af9f800a8b4df6/html5/thumbnails/4.jpg)
WHY IP SPOOFING IS EASY ?WHY IP SPOOFING IS EASY ?
Problem with the RoutersProblem with the Routers..
Routers look at Destination addresses only.Routers look at Destination addresses only.
Authentication based on Source addresses only.Authentication based on Source addresses only.
![Page 5: Ip Spoofing Ppt](https://reader035.vdocument.in/reader035/viewer/2022071700/54474dcbb1af9f800a8b4df6/html5/thumbnails/5.jpg)
IP SPOOFING STEPSIP SPOOFING STEPS
• Selecting a target hostSelecting a target host
• Identify a host that the target “trust”Identify a host that the target “trust”
• Disable the trusted hostDisable the trusted host
• Connection attempt to a service that only Connection attempt to a service that only
requires address-based authentication.requires address-based authentication.
• If successfully connected, executes a simple If successfully connected, executes a simple
command to leave a backdoor.command to leave a backdoor.
![Page 6: Ip Spoofing Ppt](https://reader035.vdocument.in/reader035/viewer/2022071700/54474dcbb1af9f800a8b4df6/html5/thumbnails/6.jpg)
Spoofing AttacksSpoofing Attacks
Spoofing is classified into :-Spoofing is classified into :-
1.1.Non-blind spoofingNon-blind spoofing
2.2.Blind spoofing Blind spoofing
3.3.Man - in - the – middle Man - in - the – middle
![Page 7: Ip Spoofing Ppt](https://reader035.vdocument.in/reader035/viewer/2022071700/54474dcbb1af9f800a8b4df6/html5/thumbnails/7.jpg)
Detection of IP Detection of IP SpoofingSpoofing
If you monitor packets using network-If you monitor packets using network-monitoring software such as net log, look for monitoring software such as net log, look for a packet on your external interface that has a packet on your external interface that has both its source and destination IP addresses both its source and destination IP addresses in your local domain. If you find one, you are in your local domain. If you find one, you are
currently under attackcurrently under attack..
![Page 8: Ip Spoofing Ppt](https://reader035.vdocument.in/reader035/viewer/2022071700/54474dcbb1af9f800a8b4df6/html5/thumbnails/8.jpg)
IP-Spoofing Counter-IP-Spoofing Counter-measuresmeasures
No insecure authenticated servicesNo insecure authenticated services
Disable commands like pingDisable commands like ping
Use encryptionUse encryption
![Page 9: Ip Spoofing Ppt](https://reader035.vdocument.in/reader035/viewer/2022071700/54474dcbb1af9f800a8b4df6/html5/thumbnails/9.jpg)
IP Trace-backIP Trace-back
• To trace back as close to the attacker’s To trace back as close to the attacker’s
location as possiblelocation as possible
• Limited in reliability and efficiencyLimited in reliability and efficiency
• Require cooperation of many other Require cooperation of many other
network operators along the routing pathnetwork operators along the routing path
![Page 10: Ip Spoofing Ppt](https://reader035.vdocument.in/reader035/viewer/2022071700/54474dcbb1af9f800a8b4df6/html5/thumbnails/10.jpg)
Applications Applications
Asymmetric routing (Splitting Asymmetric routing (Splitting
routing)routing)
NAT (Network Address Transaction)NAT (Network Address Transaction)
IP MasqueradeIP Masquerade
![Page 11: Ip Spoofing Ppt](https://reader035.vdocument.in/reader035/viewer/2022071700/54474dcbb1af9f800a8b4df6/html5/thumbnails/11.jpg)
ADVANTAGESADVANTAGES
Multiple ServersMultiple Servers
Transparent ProxyingTransparent Proxying
![Page 12: Ip Spoofing Ppt](https://reader035.vdocument.in/reader035/viewer/2022071700/54474dcbb1af9f800a8b4df6/html5/thumbnails/12.jpg)
DISADVANTAGESDISADVANTAGES
Blind to Replies :Blind to Replies : In the scanning attack as we will see In the scanning attack as we will see
next the attacker may need to see replies in such next the attacker may need to see replies in such cases ,the attacker can not use IP address cases ,the attacker can not use IP address spoofing .spoofing .
Serial attack platforms:Serial attack platforms: AAttacker attacks the target victim ttacker attacks the target victim
using a point host-the last host in the attack using a point host-the last host in the attack chain .Even if authorities learn the point host’s chain .Even if authorities learn the point host’s identityidentity
![Page 13: Ip Spoofing Ppt](https://reader035.vdocument.in/reader035/viewer/2022071700/54474dcbb1af9f800a8b4df6/html5/thumbnails/13.jpg)
CONCLUSIONCONCLUSION
IP spoofing attacks is unavoidableIP spoofing attacks is unavoidable..
Understanding how and why spoofing Understanding how and why spoofing attacks are used, combined with a few attacks are used, combined with a few simple prevention methods, can help protect simple prevention methods, can help protect your network from these malicious cloaking your network from these malicious cloaking
and cracking techniquesand cracking techniques..
![Page 14: Ip Spoofing Ppt](https://reader035.vdocument.in/reader035/viewer/2022071700/54474dcbb1af9f800a8b4df6/html5/thumbnails/14.jpg)
THANK YOU !THANK YOU !