IP Spoofing

advertisement
IP Spoofing
Suneeta Chawla
Abstract:
The report explains the IP-spoofing attack as complex technical attack that is made up of
several components. In actuality, IP-spoofing is not the attack, but a step in the attack.
The attack is actually trust-relationship exploitation. The relevant operating system and
networking information is also provided to support the explanation of the attack. The
study includes examination of the TCP/IP protocol suite structure, how the attack works,
types of spoofing attacks, where it is used and lists down a few solutions how to defend
the attack.
Resources:
1. http://www.networkcommand.com/docs/ipspoof.txt
2. http://www.securityfocus.com/infocus/1674
Download