SlideShare ist ein Scribd-Unternehmen logo
1 von 29
IP-SPOOFING




     By- Himanshu Chaurishiya
WHAT IS IP-SPOOFING ???



        IP       -> Internet Protocol..
        Spoofing -> Hiding..

   It is a trick played on servers to fool the target
computers into thinking that it is receiving data from
source other than the trusted host.

  This Attack is actually a Trust-Relationship
Exploitation.
REAL LIFE EXAMPLE TO
                                           B is on line
EXPLAIN WHAT IS
IP SPOOFING.

         A disguising his voice,making
         it sound more like that of B        C
  A
                              B

If we now,replace the 3 people by computers and change
the term “voice” with “IP-Address” then you would know
what we mean by IP-SPOOFING…
IP Packet Header
TCP Packet Header
THE 3-WAY HANDSHAKE ..


           SYN

           SYN,ACK

           ACK
CLIENT                        HOST
IP
SPOOFING
IP
SPOOFING
THE
       K
 ATTAC

1. Non-blind spoofing :

This attack takes place when the attacker is on the
same subnet as the target that could see sequence and
acknowledgement of packets.

                    SYN

   S                                         R
                    SYN,ACK


                                    ACK
                     A
2. Blind spoofing

This attack may take place from outside where sequence
and acknowledgement numbers are unreachable. Attackers
usually send several packets to the target machine in
order to figure out sequence numbers, which is easy to do
in older days. Since most OSs implement random sequence
number generation today, it becomes more difficult to
predict the sequence number accurately. If, however, the
sequence number was compromised, data could be sent to
the target.
3. Denial of Service Attack :

  IP spoofing is almost always used in denial of service
  attacks (DoS), in which attackers are concerned with
  consuming bandwidth & resources by flooding the target
  with as many packets as possible in a short amount of
  time.
4.Man in the Middle Attack

This is also called connection hijacking. In this attacks, a
malicious party intercepts a legitimate communication
between two hosts to controls the flow of communication
and to eliminate or alter the information sent by one of the
original participants without their knowledge.




   S                     A                    R
WHY IP SPOOFING IS EASY ?

•   Problem with the Routers.
•   Routers look at Destination addresses only.
•   Authentication based on Source addresses only.
•   To change source address field in IP header field is
    easy.
IO N
   E CT
DET

 Routing Methods

 • Ingress filtering
 • Egress filtering

 Non-Routing Methods

 • IP Identification Number
 • Flow Control
 • Packet Retransmission
 •Traceroute
Routing Method
Routers know IP addresses originate with which
network interface. If the router receives IP
Packets with external IP addresses on an internal
interface or vice versa its likely to be spoofed.

Filtering:

•Ingress filtering(inbound packets)-protect
org.from outside attacks.

•Egress filtering(outbound packets)-prevent
internal computers from being involved in Spoofing
Attack
Non-Routing


Active- verify that the packet was sent from
claimed source, Method validate case.

Passive- no such action, indicate packet was
spoofed.
Identification Number(ID)
   Detect IP Spoofed Packet,when attacker is on same
   Subnet as Target.
                            R
     S                          Detection as follows:
         Sen
             d   Pa c k
                       et
                                •ID value should be near the
                                Questionable packets.

                                •ID value must be greater
ID                              than the ID value in
values                          Questionable Packet.

                                •If its Spoofed there value
                                change rapidly.
Flow Control
S                R     • If the Packets = Spoofed,then
                       Sender =no recipient’s ACK
                       Packets,will not respond to flow
    AC                 control.
       K

                       •If the Recipient’s =no ACK
           ACK         Packets,Sender Should Stop After
                       the initial window size is exhausted.
 W.s.
     =
(exc I
    eed)
Contd..
    S                  R
          ACK              Another Way to Detect IP
                           Spoofing.

                 w=0       •We set W=0 ,in order to know
            ,ACK           Sender is receiving or not.
        SYN
                           •If W=0,and we get ACK with
          ACK              some Data ,it means it’s likely to
                           be Spoofed.
Packet Retransmission
S           R
    ACK         TCP uses sequence number to
                determine which Packets have been
    ReSYN       ACK.
                Method to Detect:
                •When Packet Receive with an ACK-
                number less then min expected,or
                greater than max expected,the
    ACK         Packet Drops and as a way to resyn.
                The connection,send a reply with min
                expected Ack-number is sent.
    RST         •After receiving ACK successfully
                next time sent RST in reply ,its
                spoofed.
Contd..
 FIREWALL

 Capture reply, and Prevent the internal host from
 seeing the reply ,and will Prevent an ACK-Storm .
Traceroute
   Traceroute tells number of
   hops to the true source.

   Detection is as follows

   •If the Firewall blocks UDP
   packets it will count the Hops
   to the firewall.

   •If the packet is spoofed the
   number of Hops increase.
   (monitored site more hops
   away than true ).
Backdoor
t iv e
    ve n e s
 Pre sur
  M ea


1.Packet Filtering

2.Firewall

3.Disable commands like Ping.

4.Encryption
Should arriving
                              packet be allowed
                            in? Departing packet
                                  let out?




internal network connected to Internet

Router filter packets-by-packets, decision to
forward/drop packets based on:
  --Source IP address, destination IP address.
  --TCP SYN and ACK bits.
Oh sure, Don’t
Our network   worry. We have
 is secure,       several
   right?        firewalls
CONCLUSION
IP-Spoofing is an exploitation of trust-based
relationship and can be curbed effectively if
proper measures are used. Understanding
how and why spoofing attacks are used
,combined with a few simple prevention
methods, can help protect networks from
these    malicious  cloaking   and    cracking
techniques.
Any
Queries?
THANK YOU !

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Wireless Penetration Testing
Wireless Penetration TestingWireless Penetration Testing
Wireless Penetration Testing
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 
Presentation1
Presentation1Presentation1
Presentation1
 
System hacking
System hackingSystem hacking
System hacking
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
 
DDoS Attack Presentation.pptx
DDoS Attack Presentation.pptxDDoS Attack Presentation.pptx
DDoS Attack Presentation.pptx
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
 
Snort
SnortSnort
Snort
 
Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynet
 
Spoofing
SpoofingSpoofing
Spoofing
 
Firewall
FirewallFirewall
Firewall
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Wireless penetration testing
Wireless penetration testingWireless penetration testing
Wireless penetration testing
 
ip spoofing
ip spoofingip spoofing
ip spoofing
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 

Andere mochten auch

Ip spoofing (seminar report)
Ip spoofing (seminar report)Ip spoofing (seminar report)
Ip spoofing (seminar report)Rahul Polara
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing TechniquesRaza_Abidi
 
Spoofing
SpoofingSpoofing
SpoofingSanjeev
 
Security problems in TCP/IP
Security problems in TCP/IPSecurity problems in TCP/IP
Security problems in TCP/IPSukh Sandhu
 
Spoofing Attacks حملات جعل هویت
Spoofing Attacks حملات جعل هویت Spoofing Attacks حملات جعل هویت
Spoofing Attacks حملات جعل هویت Muhibullah Aman
 
IP spoofing attacks & defence
IP spoofing attacks & defenceIP spoofing attacks & defence
IP spoofing attacks & defencevisor999
 
BasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet FiltersBasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet Filtersbhasker nalaveli
 
A Novel IP Traceback Scheme for Spoofing Attack
A Novel IP Traceback Scheme for Spoofing AttackA Novel IP Traceback Scheme for Spoofing Attack
A Novel IP Traceback Scheme for Spoofing AttackIJAEMSJORNAL
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IPMichael Lamont
 
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacksKipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacksKipp Berdiansky
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing marwan aldulaimy
 
FEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionFEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionKae Hsu
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios
 

Andere mochten auch (20)

Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Ip spoofing (seminar report)
Ip spoofing (seminar report)Ip spoofing (seminar report)
Ip spoofing (seminar report)
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
Spoofing
SpoofingSpoofing
Spoofing
 
Security problems in TCP/IP
Security problems in TCP/IPSecurity problems in TCP/IP
Security problems in TCP/IP
 
Spoofing Attacks حملات جعل هویت
Spoofing Attacks حملات جعل هویت Spoofing Attacks حملات جعل هویت
Spoofing Attacks حملات جعل هویت
 
IP spoofing attacks & defence
IP spoofing attacks & defenceIP spoofing attacks & defence
IP spoofing attacks & defence
 
BasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet FiltersBasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet Filters
 
Tcp
TcpTcp
Tcp
 
A Novel IP Traceback Scheme for Spoofing Attack
A Novel IP Traceback Scheme for Spoofing AttackA Novel IP Traceback Scheme for Spoofing Attack
A Novel IP Traceback Scheme for Spoofing Attack
 
Spoofing
SpoofingSpoofing
Spoofing
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacksKipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
 
FEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionFEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP Introduction
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
 

Ähnlich wie Himanshupptx

Detection and analysis_of_syn_flood_ddos
Detection and analysis_of_syn_flood_ddosDetection and analysis_of_syn_flood_ddos
Detection and analysis_of_syn_flood_ddosOleh Stupak
 
Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANsIshraq Al Fataftah
 
Vulnerabilities in IP Protocols
Vulnerabilities in IP ProtocolsVulnerabilities in IP Protocols
Vulnerabilities in IP Protocolsbabak danyal
 
Zhiyun Qian-what leaves attacker hijacking USA Today site
Zhiyun Qian-what leaves attacker hijacking USA Today siteZhiyun Qian-what leaves attacker hijacking USA Today site
Zhiyun Qian-what leaves attacker hijacking USA Today siteGeekPwn Keen
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxMahdiHasanSowrav
 
poofing.ppt jrjejjhhhhhhhhhhthfjrjejejejejdjdj
poofing.ppt jrjejjhhhhhhhhhhthfjrjejejejejdjdjpoofing.ppt jrjejjhhhhhhhhhhthfjrjejejejejdjdj
poofing.ppt jrjejjhhhhhhhhhhthfjrjejejejejdjdjAjithsuresh12
 
Network Security fundamentals
Network Security fundamentalsNetwork Security fundamentals
Network Security fundamentalsTariq kanher
 
Network security basics
Network security basicsNetwork security basics
Network security basicsSkillspire LLC
 
DDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeDDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeMyNOG
 
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...PROIDEA
 
Ip spoofing & types of attachs using it
Ip spoofing & types of attachs using itIp spoofing & types of attachs using it
Ip spoofing & types of attachs using itRajesh Porwal
 
Hacking Cisco Networks and Countermeasures
Hacking Cisco Networks and CountermeasuresHacking Cisco Networks and Countermeasures
Hacking Cisco Networks and Countermeasuresdkaya
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYVinil Patel
 

Ähnlich wie Himanshupptx (20)

Detection and analysis_of_syn_flood_ddos
Detection and analysis_of_syn_flood_ddosDetection and analysis_of_syn_flood_ddos
Detection and analysis_of_syn_flood_ddos
 
Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANs
 
Vulnerabilities in IP Protocols
Vulnerabilities in IP ProtocolsVulnerabilities in IP Protocols
Vulnerabilities in IP Protocols
 
Zhiyun Qian-what leaves attacker hijacking USA Today site
Zhiyun Qian-what leaves attacker hijacking USA Today siteZhiyun Qian-what leaves attacker hijacking USA Today site
Zhiyun Qian-what leaves attacker hijacking USA Today site
 
Network Security
Network SecurityNetwork Security
Network Security
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptx
 
Sudheer tech seminor
Sudheer tech seminorSudheer tech seminor
Sudheer tech seminor
 
poofing.ppt jrjejjhhhhhhhhhhthfjrjejejejejdjdj
poofing.ppt jrjejjhhhhhhhhhhthfjrjejejejejdjdjpoofing.ppt jrjejjhhhhhhhhhhthfjrjejejejejdjdj
poofing.ppt jrjejjhhhhhhhhhhthfjrjejejejejdjdj
 
Network Security fundamentals
Network Security fundamentalsNetwork Security fundamentals
Network Security fundamentals
 
Network security basics
Network security basicsNetwork security basics
Network security basics
 
DDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeDDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL Lee
 
Network and DNS Vulnerabilities
Network and DNS VulnerabilitiesNetwork and DNS Vulnerabilities
Network and DNS Vulnerabilities
 
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
 
Ip spoofing & types of attachs using it
Ip spoofing & types of attachs using itIp spoofing & types of attachs using it
Ip spoofing & types of attachs using it
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
spoofing.ppt
spoofing.pptspoofing.ppt
spoofing.ppt
 
Hacking Cisco Networks and Countermeasures
Hacking Cisco Networks and CountermeasuresHacking Cisco Networks and Countermeasures
Hacking Cisco Networks and Countermeasures
 
Network security
Network securityNetwork security
Network security
 
26 security2
26 security226 security2
26 security2
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 

Mehr von Himanshu Chaurishiya (6)

Ror
RorRor
Ror
 
Experiment1
Experiment1Experiment1
Experiment1
 
Web3
Web3Web3
Web3
 
909ab45j890
909ab45j890909ab45j890
909ab45j890
 
Ppt it act
Ppt it actPpt it act
Ppt it act
 
ONLINE COMPLAINT MANAGEMENT SYSTEM
ONLINE COMPLAINT MANAGEMENT SYSTEMONLINE COMPLAINT MANAGEMENT SYSTEM
ONLINE COMPLAINT MANAGEMENT SYSTEM
 

Kürzlich hochgeladen

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 

Kürzlich hochgeladen (20)

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 

Himanshupptx

  • 1. IP-SPOOFING By- Himanshu Chaurishiya
  • 2. WHAT IS IP-SPOOFING ??? IP -> Internet Protocol.. Spoofing -> Hiding.. It is a trick played on servers to fool the target computers into thinking that it is receiving data from source other than the trusted host. This Attack is actually a Trust-Relationship Exploitation.
  • 3. REAL LIFE EXAMPLE TO B is on line EXPLAIN WHAT IS IP SPOOFING. A disguising his voice,making it sound more like that of B C A B If we now,replace the 3 people by computers and change the term “voice” with “IP-Address” then you would know what we mean by IP-SPOOFING…
  • 6. THE 3-WAY HANDSHAKE .. SYN SYN,ACK ACK CLIENT HOST
  • 9. THE K ATTAC 1. Non-blind spoofing : This attack takes place when the attacker is on the same subnet as the target that could see sequence and acknowledgement of packets. SYN S R SYN,ACK ACK A
  • 10. 2. Blind spoofing This attack may take place from outside where sequence and acknowledgement numbers are unreachable. Attackers usually send several packets to the target machine in order to figure out sequence numbers, which is easy to do in older days. Since most OSs implement random sequence number generation today, it becomes more difficult to predict the sequence number accurately. If, however, the sequence number was compromised, data could be sent to the target.
  • 11. 3. Denial of Service Attack : IP spoofing is almost always used in denial of service attacks (DoS), in which attackers are concerned with consuming bandwidth & resources by flooding the target with as many packets as possible in a short amount of time.
  • 12. 4.Man in the Middle Attack This is also called connection hijacking. In this attacks, a malicious party intercepts a legitimate communication between two hosts to controls the flow of communication and to eliminate or alter the information sent by one of the original participants without their knowledge. S A R
  • 13. WHY IP SPOOFING IS EASY ? • Problem with the Routers. • Routers look at Destination addresses only. • Authentication based on Source addresses only. • To change source address field in IP header field is easy.
  • 14. IO N E CT DET Routing Methods • Ingress filtering • Egress filtering Non-Routing Methods • IP Identification Number • Flow Control • Packet Retransmission •Traceroute
  • 15. Routing Method Routers know IP addresses originate with which network interface. If the router receives IP Packets with external IP addresses on an internal interface or vice versa its likely to be spoofed. Filtering: •Ingress filtering(inbound packets)-protect org.from outside attacks. •Egress filtering(outbound packets)-prevent internal computers from being involved in Spoofing Attack
  • 16. Non-Routing Active- verify that the packet was sent from claimed source, Method validate case. Passive- no such action, indicate packet was spoofed.
  • 17. Identification Number(ID) Detect IP Spoofed Packet,when attacker is on same Subnet as Target. R S Detection as follows: Sen d Pa c k et •ID value should be near the Questionable packets. •ID value must be greater ID than the ID value in values Questionable Packet. •If its Spoofed there value change rapidly.
  • 18. Flow Control S R • If the Packets = Spoofed,then Sender =no recipient’s ACK Packets,will not respond to flow AC control. K •If the Recipient’s =no ACK ACK Packets,Sender Should Stop After the initial window size is exhausted. W.s. = (exc I eed)
  • 19. Contd.. S R ACK Another Way to Detect IP Spoofing. w=0 •We set W=0 ,in order to know ,ACK Sender is receiving or not. SYN •If W=0,and we get ACK with ACK some Data ,it means it’s likely to be Spoofed.
  • 20. Packet Retransmission S R ACK TCP uses sequence number to determine which Packets have been ReSYN ACK. Method to Detect: •When Packet Receive with an ACK- number less then min expected,or greater than max expected,the ACK Packet Drops and as a way to resyn. The connection,send a reply with min expected Ack-number is sent. RST •After receiving ACK successfully next time sent RST in reply ,its spoofed.
  • 21. Contd.. FIREWALL Capture reply, and Prevent the internal host from seeing the reply ,and will Prevent an ACK-Storm .
  • 22. Traceroute Traceroute tells number of hops to the true source. Detection is as follows •If the Firewall blocks UDP packets it will count the Hops to the firewall. •If the packet is spoofed the number of Hops increase. (monitored site more hops away than true ).
  • 24. t iv e ve n e s Pre sur M ea 1.Packet Filtering 2.Firewall 3.Disable commands like Ping. 4.Encryption
  • 25. Should arriving packet be allowed in? Departing packet let out? internal network connected to Internet Router filter packets-by-packets, decision to forward/drop packets based on: --Source IP address, destination IP address. --TCP SYN and ACK bits.
  • 26. Oh sure, Don’t Our network worry. We have is secure, several right? firewalls
  • 27. CONCLUSION IP-Spoofing is an exploitation of trust-based relationship and can be curbed effectively if proper measures are used. Understanding how and why spoofing attacks are used ,combined with a few simple prevention methods, can help protect networks from these malicious cloaking and cracking techniques.