answersLogoWhite

0

In this technique, an attacker sends packets with an incorrect source address. when this happens the receiver i.e the party who receives the packets containg a false source address would inadvertently send replies back to the forged address and not to the attacker

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

Difference between packet sniffing and packet spoofing?

Passive wiretapping, usually on a local area network, to gain knowledge of passwords. Attempt by an unauthorized entity to gain access to a system by posing as an authorized user is spoofing


Teardrop is a spoofing attack a packet fragmentation attack or an attack utilizing a zombie?

It's packet fragmentation attack by sending overlapping fragments.


Specific requirements on controlling ip spoofing?

This is usually handled by a border router with outbound (egress) filtering. It checks the packet for addresses that do not match the network you are in and drops the packet from going out.


How do you implement ip spoofing?

Ip spoofing is done by modifying the source address of a ip packet from where it is initiated and spoofing another ip address of trusted host and sent to the destination selected as a victim. There are many application program available in the website through which we can spoof an ip address.


What is Spoofing in Spanish?

iv'e checked. it is just spoofing. i don't think there is a word for your 'spoofing'!! XD


Is ip spoofing is same as the web spoofing?

yea its same


Can you go to jail for spoofing?

Yes, spoofing can be illegal and is considered a form of fraud in many jurisdictions. Engaging in spoofing activities such as caller ID spoofing or email spoofing with the intent to deceive or defraud can result in criminal charges and potential jail time. It is important to always use spoofing technology responsibly and legally.


In order to gain illegitimate access to a network attackers often by-pass access control lists by?

switching off your computer


When was Spook Spoofing created?

Spook Spoofing was created on 1928-01-14.


What is antispoofing?

Using spoofing, an intruder can fake the source address of his packets and make them look like they originated on the trusted hosts.The basic idea of anti-spoofing protection is to create a firewall rule assigned to the external interface of the firewall that examines source address of all packets crossing that interface coming from outside. If the address belongs to the internal network or the firewall itself, the packet is dropped.


What is ip spoofing?

IP spoofing is the process by which an IP address is created in order to conceal the senders identity or impersonate another person's IP address. IP spoofing is a crime and punishable by law.


What are the release dates for Spook Spoofing - 1928?

Spook Spoofing - 1928 was released on: USA: 14 January 1928

Trending Questions
What are the main lines for Dell laptop computers? What to do if Sony MHC-GX450 will not turn on the power button only flashes? Who wrote 'The Road Ahead' about the future of personal computing in 1995 and got it so wrong he had to rewrite large parts of it the following year? What is your aim in spanish? Why turning off the computer using the power switch might be harmful to the system? Which problem could occur if a screwdriver is used to pry the top off of a computer case? What rules that apply when communicating over computer? Is phonezoo.com safe? Is so dimm for a notebook computer more or less expensive than an equivalent amount of rambus memory or for a desktop PC? What is the search technology called that enables you to search a remote server or web service from windows explrer using the same techniques that you use to search for that are stored on your own com? How much will 4GB of memory last on 720p recording? Is the communications methodology where data is broken into smaller chunks to be sent over various routes at the same time? when I shut down my PC then turn it back on I do not get on the internet, I have to reset or unplug the router to get back on the internet. why? Which technical reviews is held during the technology maturation and risk reduction phase to ascertain progress in defining system technical requirements? Why are computers needed for mathematical models that represent weather? What is the function of the little red switch on the back of a Model 404 HP computer.? What is the meaning of automated software testing? What is a subnet mass? My mother has a gold Schatz clock that was made in Germany and we think it was made in about 1949. Does anyone know how much it would be worth? How many people use the Internet in Hawaii?