answersLogoWhite

0

This is usually handled by a border router with outbound (egress) filtering. It checks the packet for addresses that do not match the network you are in and drops the packet from going out.

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

What is ip spoofing?

IP spoofing is the process by which an IP address is created in order to conceal the senders identity or impersonate another person's IP address. IP spoofing is a crime and punishable by law.


Is ip spoofing is same as the web spoofing?

yea its same


How do you implement ip spoofing?

Ip spoofing is done by modifying the source address of a ip packet from where it is initiated and spoofing another ip address of trusted host and sent to the destination selected as a victim. There are many application program available in the website through which we can spoof an ip address.


Can a hacker steal your ip address?

By stealing, if you mean using it, then yes. By spoofing the ip. But they are actually using your ip FROM their own. So your ip is a layer.


What are the advantages and disadvantages of ip spoofing?

cost efficient to speed efficiency


4 bad effects of ip spoofing?

i dont know too. are you an stc person?


How can you make my IP appear as though you are coming from the US?

IP spoofing, nice hacker question. the answer is way too long to post on wikianswers.


Can someone copy or hack your IP address making it look like things come from your PC?

This is known as IP spoofing, and it can be done to a degree.


Wthat Is called when hackers change the source IP addresses on the packets they send so that they appear to be coming from another system?

IP spoofing


What is the difference between ip spoofing and ip hiding?

When you spoof an IP address, you make it look like you're connecting to the internet with a computer that you're not. When you hide your IP address, it's so people trying to find your IP address can't find it.


What is dhcp spoofing?

DHCP Spoofing is a Man-in-The-Middle technique whereby the attacker responds to DHCP request message, providing the target with an IP address and also setting the attacker's IP address as the gateway address of the victim machine, thereby relaying all traffic from the victim's machine via the attacker's machine.


How does SSL mitigate IP Spoofing?

SSL (Secure Sockets Layer) mitigates IP spoofing by establishing a secure, encrypted connection between the client and server, using authentication mechanisms that verify the identity of both parties. This process involves the use of digital certificates, ensuring that the server is legitimate and the data exchanged is encrypted, making it difficult for an attacker to impersonate the server or intercept the communication. By requiring a valid certificate and mutual authentication, SSL helps prevent unauthorized access and man-in-the-middle attacks associated with IP spoofing.