IP Spoofing in network
-
I recently seen at internet IP spoofing increasing all over world. Why IP spoofing is done and what is the purpose of doing this?
-
Well there are many reasons for IP Spoofing to be done. You might use it as a tool for checking things on your network. You might use it for load balancing. But the primary reason that it is done on the Internet is as an attack. It is a means of impersonating another system:
In computer networking, IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a source IP address, with the purpose of concealing the identity of the sender or impersonating another computing system.
-
The biggest use of IP Spoofing, on the open Internet, is in Denial of Service attacks. It is a handy way to send a lot of traffic at a target without that traffic coming back to you.
-
So as an example, your IP address is 12.12.12.2 and I want to attack you. If I send a lot of traffic from my IP, 18.18.18.5, you will see it all coming from me and will simply respond to me. My ability to attack you is equaled by your ability to "attack" back. I could only do so much damage.
But if I get a couple of friends' machines and they do IP Spoofing and pretend to be other people, they attack 12.12.12.2 and you get attacked, but when you respond you are responding to fake IP addresses and do not impact their machines. So they can keep attacking and you can do nothing (easily.)
-
Having friends' computers involved would take us from a Denial of Service to a Distributed Denial of Service.
-
@scottalanmiller Ok Whether any tool is used in Kali linux to do this?Whether that worked in any of the system?Whether DoS is out of Law?
-
@Lakshmana said:
Whether DoS is out of Law?
Very illegal. In the US if you get caught, you are definitely spending a long time in prison.
-
@Lakshmana said:
@scottalanmiller Ok Whether any tool is used in Kali linux to do this? Whether that worked in any of the system?
I would not even ask these questions. Under no condition is this something you want to do.
-
@scottalanmiller Ok I understood
-
You CAN spoof with just about anything. No special tools needed.