SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Web Spoofing: the game for
hackers
Created BY:
Khunt Jignesh N.
Roll no : 25
Web Spoofing
 Web Spoofing is a security attack that allows an
adversary to observe and modify all web pages sent to
the victim's machine, and observe all information entered
into forms by the victim.
 The attacker can observe and modify all web pages and
form submissions, even when the browser's "secure
connection" indicator is lit. The user sees no indication
that anything is wrong.
 After your browser has been fooled, the spoofed web
server can send you fake web pages or prompt you to
provide personal information such as login Id, password,
or even credit card or bank account numbers.
Types of web Spoofing
 IP Spoof
 E-mail Spoof
 Non Technical Spoof
IP spoofing & its prevention
 The creation of IP packets with a forged source. The
purpose of it is to conceal the identity of the sender or
impersonating another computing system.
 Some upper layer protocols provide their own defense
against IP spoofing.
 For example, TCP uses sequence numbers negotiate
with
the remote machine to ensure that the arriving packets
are part of an established connection. Since the attacker
normally cant see any reply packets, he has to guess the
sequence number in order to hijack the connection.
Example of ip-spoofing
E-mail spoofing
 E-mail spoofing is the forgery of an e-mail
header so that the message appears to
have originated from someone or
somewhere other than the actual source.
Example of e-mail spoof
How to prevent it
 Don’t click links in emails instead always
copy and paste, or even better manually type
the URL in.
 When entering personal or sensitive
information, verify the URL is as you expect,
and the site’s SSL certificate matches that
URL.
 Look at the IP information of the email
header. If an email originated from inside
your network, the sender should have very
similar IP address.
Non-technical spoofing
 These non-computer based techniques
are commonly referred to as social
engineering. This can be as simple as the
attacker calling someone on the phone
saying that he is a certain person.
Example of Non-Technical
Spoofing
Why does Non-Technical Spoof
Works.
 The main reason is that it exploits
attributes of human behavior: trust is good
and people love to talk. Most people
assume that if someone is nice and
pleasant, he must be honest. If an attacker
can sound sincere and listen, you would
be amazed at what people will tell him.
Non-Technical Spoof Prevention
 Educate your users
 Have proper policies
Conclusion
 We should remain updated in this fields.
 Daily there will be new challenges as the
hackers seek out weakness and
vulnerabilities in our systems.
 ANY QUERIES???
Web spoofing hacking

Weitere ähnliche Inhalte

Was ist angesagt?

Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention
International Journal of Science and Research (IJSR)
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
Anushakp9
 

Was ist angesagt? (20)

Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing Attacks
 
Ip spoofing & types of attachs using it
Ip spoofing & types of attachs using itIp spoofing & types of attachs using it
Ip spoofing & types of attachs using it
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Spoofing
SpoofingSpoofing
Spoofing
 
Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention Proposed Methods of IP Spoofing Detection & Prevention
Proposed Methods of IP Spoofing Detection & Prevention
 
Presentation1
Presentation1Presentation1
Presentation1
 
Ipspoofing
IpspoofingIpspoofing
Ipspoofing
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
Himanshupptx
HimanshupptxHimanshupptx
Himanshupptx
 
ip spoofing
ip spoofingip spoofing
ip spoofing
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 
My ppt..priya
My ppt..priyaMy ppt..priya
My ppt..priya
 
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacksKipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
Man In The Middle - Hacking Illustrated
Man In The Middle - Hacking IllustratedMan In The Middle - Hacking Illustrated
Man In The Middle - Hacking Illustrated
 
IS Security Presentation
IS Security PresentationIS Security Presentation
IS Security Presentation
 
Unauthorized access, Men in the Middle (MITM)
Unauthorized access, Men in the Middle (MITM)Unauthorized access, Men in the Middle (MITM)
Unauthorized access, Men in the Middle (MITM)
 
Infosec
InfosecInfosec
Infosec
 

Andere mochten auch (9)

The Case of the Mistaken Malware
The Case of the Mistaken MalwareThe Case of the Mistaken Malware
The Case of the Mistaken Malware
 
The Case of the Stockpiled Credit Cards
The Case of the Stockpiled Credit CardsThe Case of the Stockpiled Credit Cards
The Case of the Stockpiled Credit Cards
 
The Case of the Suspiciously Flawless Investigation
The Case of the Suspiciously Flawless InvestigationThe Case of the Suspiciously Flawless Investigation
The Case of the Suspiciously Flawless Investigation
 
Ataques spoofing y botnet
Ataques spoofing y botnetAtaques spoofing y botnet
Ataques spoofing y botnet
 
Ataque a la red de datos, diapositivas
Ataque a la red de datos, diapositivasAtaque a la red de datos, diapositivas
Ataque a la red de datos, diapositivas
 
Spoofing
SpoofingSpoofing
Spoofing
 
Presentation on the Patent Process in US
Presentation on the Patent Process in USPresentation on the Patent Process in US
Presentation on the Patent Process in US
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 

Ähnlich wie Web spoofing hacking

phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptx
ErrorError22
 
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HemantSharma134028
 

Ähnlich wie Web spoofing hacking (20)

Computer hacking
Computer hackingComputer hacking
Computer hacking
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptx
 
Network Security
Network SecurityNetwork Security
Network Security
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
342_IP_Spoofing.pptx
342_IP_Spoofing.pptx342_IP_Spoofing.pptx
342_IP_Spoofing.pptx
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
rajat_ppt
rajat_pptrajat_ppt
rajat_ppt
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
 
Man in the middle
Man in the middleMan in the middle
Man in the middle
 
Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls Attacks
 
Phishing
PhishingPhishing
Phishing
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
E commerce-securityy
E commerce-securityyE commerce-securityy
E commerce-securityy
 
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
Impacts of spoofing- why it’s a serious cybersecurity concern
Impacts of spoofing- why it’s a serious cybersecurity concernImpacts of spoofing- why it’s a serious cybersecurity concern
Impacts of spoofing- why it’s a serious cybersecurity concern
 

Kürzlich hochgeladen

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Kürzlich hochgeladen (20)

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Web spoofing hacking

  • 1. Web Spoofing: the game for hackers Created BY: Khunt Jignesh N. Roll no : 25
  • 2. Web Spoofing  Web Spoofing is a security attack that allows an adversary to observe and modify all web pages sent to the victim's machine, and observe all information entered into forms by the victim.  The attacker can observe and modify all web pages and form submissions, even when the browser's "secure connection" indicator is lit. The user sees no indication that anything is wrong.  After your browser has been fooled, the spoofed web server can send you fake web pages or prompt you to provide personal information such as login Id, password, or even credit card or bank account numbers.
  • 3. Types of web Spoofing  IP Spoof  E-mail Spoof  Non Technical Spoof
  • 4. IP spoofing & its prevention  The creation of IP packets with a forged source. The purpose of it is to conceal the identity of the sender or impersonating another computing system.  Some upper layer protocols provide their own defense against IP spoofing.  For example, TCP uses sequence numbers negotiate with the remote machine to ensure that the arriving packets are part of an established connection. Since the attacker normally cant see any reply packets, he has to guess the sequence number in order to hijack the connection.
  • 6. E-mail spoofing  E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.
  • 8. How to prevent it  Don’t click links in emails instead always copy and paste, or even better manually type the URL in.  When entering personal or sensitive information, verify the URL is as you expect, and the site’s SSL certificate matches that URL.  Look at the IP information of the email header. If an email originated from inside your network, the sender should have very similar IP address.
  • 9. Non-technical spoofing  These non-computer based techniques are commonly referred to as social engineering. This can be as simple as the attacker calling someone on the phone saying that he is a certain person.
  • 11. Why does Non-Technical Spoof Works.  The main reason is that it exploits attributes of human behavior: trust is good and people love to talk. Most people assume that if someone is nice and pleasant, he must be honest. If an attacker can sound sincere and listen, you would be amazed at what people will tell him.
  • 12. Non-Technical Spoof Prevention  Educate your users  Have proper policies
  • 13. Conclusion  We should remain updated in this fields.  Daily there will be new challenges as the hackers seek out weakness and vulnerabilities in our systems.