Download presentation
Presentation is loading. Please wait.
Published byLiliana Baldwin Modified over 8 years ago
1
Spoofing The False Digital Identity
2
What is Spoofing? Spoofing is the action of making something look like something that it is not in order to gain unauthorized access to a user's private information.
3
IP Spoofing IP Spoofing IP spoofing is the act of manipulated the headers in a transmitted message to mask a hackers true identity so that the message could appear as though it is from a trusted source. Source: http://www.securityfocus.com/info cus/1674 http://www.securityfocus.com/info cus/1674 http://www.securityfocus.com/info cus/1674
4
Attacks Man-in-the-Middle attack In a Man-in-the-Middle attack, the message sent to a recipient is intercepted by a third- party which manipulates the packets and resends it own message. Denial of Service (DoS) Attack A DoS attack is when a attacker floods a system with more packets than its resources can handle.
5
Solutions Monitoring packets using network monitoring software. Installing a filtering router
6
URL Spoofing URL spoofing occurs when one website poses as another. The URL address displayed appears to be legitimate but is not the actual URL of the site. For example the URL www.chase.com may be displayed in the website however information is sent to an entirely different location. www.chase.com
7
Attacks Phishing Using a Fraudulent site to obtain sensitive information
8
Solutions Browser security patches
9
Email Spoofing Altering the header of an email so that the email appears to be sent from someone else
10
Really?
12
Usage: Cause confusion or discredit a person Social engineering (phishing) Hide the identity of the sender (spamming) Relay replies of your own messages to a different mailbox
13
How can you find out if an email is spoofed? Check the content of the email: Is the content weird in some way, or really unexpected from the sender? Does it contain a form? Does it request to either confirm or update login or any kind of information? Check the header of the email Detection
14
What if someone pretends to be me? You can’t really do anything How do you prevent it? Do not post your email address on boards, forums or chats Do not use your email address as a username to login to a site Have separate addresses for different online activities
15
What makes email spoofing possible? It is easy to spoof email because SMTP (Simple Mail Transfer Protocol) lacks authentication. If a site has configured the mail server to allow connections to the SMTP port, anyone can connect to the SMTP port of a site and (in accordance with that protocol) issue commands that will send email that appears to be from the address of the individual's choice; this can be a valid email address or a fictitious address that is correctly formatted. www.cert.org
16
Yahoo! – DomainKeys – “Internet standard from Yahoo! that lets us confirm whether emails are really from their claimed domain “ Prevention
17
CertifiedMail CertifiedMail's Secure Email System for in- house use enhances your existing email system by providing secure, trackable delivery of e-mail messages to any Internet recipient. Prevention
18
-Mail Server Authentication -Digitally Signed Email with Desktop Verification -Digitally Signed Email with Gateway Verification -Mail Server IP Verification www.antiphishing.org Prevention
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.