ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    IP Spoofing in network

    IT Discussion
    security ip spoofing networking
    2
    10
    2.0k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • LakshmanaL
      Lakshmana
      last edited by scottalanmiller

      I recently seen at internet IP spoofing increasing all over world. Why IP spoofing is done and what is the purpose of doing this?

      1 Reply Last reply Reply Quote 1
      • scottalanmillerS
        scottalanmiller
        last edited by

        Well there are many reasons for IP Spoofing to be done. You might use it as a tool for checking things on your network. You might use it for load balancing. But the primary reason that it is done on the Internet is as an attack. It is a means of impersonating another system:

        In computer networking, IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a source IP address, with the purpose of concealing the identity of the sender or impersonating another computing system.

        1 Reply Last reply Reply Quote 1
        • scottalanmillerS
          scottalanmiller
          last edited by

          The biggest use of IP Spoofing, on the open Internet, is in Denial of Service attacks. It is a handy way to send a lot of traffic at a target without that traffic coming back to you.

          1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller
            last edited by

            So as an example, your IP address is 12.12.12.2 and I want to attack you. If I send a lot of traffic from my IP, 18.18.18.5, you will see it all coming from me and will simply respond to me. My ability to attack you is equaled by your ability to "attack" back. I could only do so much damage.

            But if I get a couple of friends' machines and they do IP Spoofing and pretend to be other people, they attack 12.12.12.2 and you get attacked, but when you respond you are responding to fake IP addresses and do not impact their machines. So they can keep attacking and you can do nothing (easily.)

            1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller
              last edited by

              Having friends' computers involved would take us from a Denial of Service to a Distributed Denial of Service.

              LakshmanaL 1 Reply Last reply Reply Quote 1
              • LakshmanaL
                Lakshmana @scottalanmiller
                last edited by

                @scottalanmiller Ok Whether any tool is used in Kali linux to do this?Whether that worked in any of the system?Whether DoS is out of Law?

                scottalanmillerS 2 Replies Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @Lakshmana
                  last edited by

                  @Lakshmana said:

                  Whether DoS is out of Law?

                  Very illegal. In the US if you get caught, you are definitely spending a long time in prison.

                  1 Reply Last reply Reply Quote 2
                  • scottalanmillerS
                    scottalanmiller @Lakshmana
                    last edited by

                    @Lakshmana said:

                    @scottalanmiller Ok Whether any tool is used in Kali linux to do this? Whether that worked in any of the system?

                    I would not even ask these questions. Under no condition is this something you want to do.

                    LakshmanaL 1 Reply Last reply Reply Quote 0
                    • LakshmanaL
                      Lakshmana @scottalanmiller
                      last edited by

                      @scottalanmiller Ok I understood

                      1 Reply Last reply Reply Quote 0
                      • scottalanmillerS
                        scottalanmiller
                        last edited by

                        You CAN spoof with just about anything. No special tools needed.

                        1 Reply Last reply Reply Quote 0
                        • 1 / 1
                        • First post
                          Last post