Date post: | 21-Apr-2015 |
Category: |
Documents |
Upload: | sanjeev-maurya |
View: | 306 times |
Download: | 4 times |
UNDERGUIDANCE BY :-Mr. RUPAK SHARMA
SUBMITTED BY:-SATYENDRA PRATAP SINGHMCA 4TH SEM REG. NO. 3521030104
(Asst. Prof.)
SPOOFING
WEB SPOOFING
TYPES OF SPOOFING
SPOOFING THE WHOLE WORD
HOW TO PREVET IT
Spoofing means pretending to be something you are not. In internet terms it means pretending to be different internet terms it means pretending to be different internet address from the one you really have in order to gain something. That might be information like credit card number, password etc.
Web spoofing allow attacker to create a “shadow copy” of the entire world wide web. In short, the attacker observes and controls everything the victim does on the web.The attack is implemented using java scripts and web servers Plug-ins.
IP SPOOFING
ARP SPOOFING
DNS SPOOFING
WEB SPOOFING
Email spoofing
IP spoofing is a technique that is used by hackers to get an original IP address by creating IP packets. This consists in sending messages from untrusted source, but who receives the message thinks that it comes from trusted host.
ARP spoofing is a hacking methodology to forge the content of an ARP table on an Ethernet (LAN) by creating or changing the ARP table. The LAN works with MAC addresses and the ARP protocol converts IP address to MAC address in order to establish communication between computers. If the wrong information is saved into the ARP table, it is because the computer believes that it is valid.
DNS spoofing is a forgery of the Domain Name Service to generate a request to Server.
WEB spoofing is when hackers can make an exact copy of the whole World Wide Web (Web page) with the objective to acquire and monitor information (e.g. passwords or account numbers) of that web page. In summary, web spoofing is a forgery of a web page where hackers can control and manipulate the whole private information.
Email spoofing method allows hackers sending emails from a fake email that they got from a personal or entity email. Spammers use this technique because they want to send messages to thousands and thousands users. Those emails seem to have been originated from a source that does not exist and those emails are called "junk or spam" emails.
Don’t click links in email instead always copy and paste or even better manually type the URL in.
When entering personal or sensitive information, verify the URL is as you expect and the site’s SSL certificate matches that URL .