Download presentation
Presentation is loading. Please wait.
1
Presentation on ip spoofing BY
Prashant Singh CS-73
2
Contents What is IP Spoofing? When IP Spoofing Occurs?
3-Way Handshake in TCP/IP How Spoofing take place? Basic Concept of Spoofing Why IP Spoofing is so easy? Types of Spoofing Attack Stopping IP address Spoofing Attack Detection of IP Spoofing Attack How we prevent IP Spoofing? Our Misconception Software for IP Spoofing Software to Stop IP Spoofing References
3
What is IP Spoofing? IP spoofing is a technique used to gain unauthorized access to computers, where by the attacker sends messages to a computer with a forging IP address indicating that the message is coming from a trusted host Attacker puts an internal, or trusted, IP address as its source. The access control device sees the IP address as trusted and lets it through
4
What is IP Spoofing?
5
What is IP Spoofing?
6
When Spoofing occurs? IP spoofing occurs when a hacker inside or outside a network impersonates the conversations of a trusted computer. Two general techniques of IP spoofing: A hacker uses an IP address that is within the range of trusted IP addresses. A hacker uses an authorized external IP address that is trusted
7
3-Way Handshake in TCP/IP
The client selects and transmits an initial sequence number ISNC ,the server acknowledges it and sends its own sequence number ISNS ,and the client acknowledges it. The exchange may show schematically as follows CS: SYN(ISNC) SC: SYN(ISNS) , ACK(ISNC) CS: ACK(ISNS) CS: DATA OR SC: DATA
8
How Spoofing take place?
Suppose, there is a way for an intruder X to predict ISNS .In this case , it could send the following sequence to impersonate trusted host T : XS: SYN(ISNX ) , SRC=T ST: SYN(ISNS) , ACK(ISNX) XS: ACK(ISNS) , SRC=T XS: ACK(ISNS) , SRC=T , nasty data
9
Basic Concept of IP Spoofing
Src_IP dst_IP Any (>1024) Src_port 80 dst_port spoofed Src_IP dst_IP Any (>1024) Src_port 80 dst_port
10
IP Spoofing Attacker- it is right at the upper corner
11
Why IP Spoofing is so easy?
Problem with the Routers. Routers look at Destination addresses only. Authentication based on Source addresses only. To change source address field in IP header field is easy by the use of the software.
12
Types of Spoofing Attack
The number of IP Spoofing attacks are: Non-Blinding Attack This attack take place when the Victim and the Attacker are on the same network. In this the we have to make the assumption to find the sequence number passed from Target to Victim.
13
Non- Blinding Spoofing
14
Spoofing Attacks Blind Spoofing
It is mainly used to abuse the trust relationship between hosts. Today, most OSs implement random sequence number generation, making it difficult to predict them accurately. In this many packet are sent to the victim
15
Oops, many packets are coming. But, who is the real source?
Spoofing Attacks: Blinding Attack sender ip spoofed packet dst: victim src: random Oops, many packets are coming. But, who is the real source? flooding attack victim
16
intercept / block / delay traffic
Spoofing Attacks: Man in the Middle Attack( Connection Hijacking) In this the attacker control the gateway that is in the delivery route, he can sniff the traffic intercept / block / delay traffic modify traffic
17
Spoofing Attacks:
18
Spoofing Attacks:
19
Spoofing Attacks: ICMP Echo attacks Map the hosts of a network
The attack sends ICMP echo datagram to all the hosts in a subnet, then he collects the replies and determines which hosts are alive. Denial of service attack (SMURF attack) The attack sends spoofed (with victim‘s IP address) ICMP Echo Requests to subnets, the victim will get ICMP Echo Replies from every machine.
20
Smurf Attack
21
Spoofing Attacks: ICMP Redirect attacks
ICMP redirect messages can be used to re-route traffic on specific routes or to a specific host that is not a router at all. The ICMP redirect attack is very simple: just send a spoofed ICMP redirect message that appears to come from the host‘s default gateway.
22
ICMP Redirect attacks
23
ICMP Redirect attacks
24
ICMP destination unreachable attacks
ICMP destination unreachable message is used by gateways to state that the datagram cannot be delivered. It can be used to “cut” out nodes from the network. It is a denial of service attack (DOS) Example: An attacker injects many forged destination unreachable messages stating that is unreachable) into a subnet (e.g *). If someone from the * net tries to contact , he will immediately get an ICMP Time Exceeded from the attacker‘s host. For * this means that there is no way to contact , and therefore communication fails.
25
ICMP destination unreachable attacks
26
Stopping IP address spoofing attack
Packet filtering The router that connects a network to another network is known as a border router. One way to mitigate the threat of IP spoofing is by inspecting packets when they leave and enter a network looking for invalid source IP addresses. If this type of filtering were performed on all border routers, IP address spoofing would be greatly reduced. Ingress Filtering Egress Filtering
27
Packet filtering You are spoofing! You are spoofing! You are spoofing! srcip: × srcip: /23 × srcip: RT.a RT.b × × srcip: /24 × srcip: srcip: Hmm, this looks ok...but.. You are spoofing! You are spoofing! we can check and drop the packets which have unused address everywhere, but used space can be checked before aggregation
28
Detection of IP Spoofing
If you monitor packets using network-monitoring software such as netlog, look for a packet on your external interface that has both its source and destination IP addresses in your local domain. If you find one, you are currently under attack
29
Detection of IP Spoofing
Another way to detect IP spoofing is to compare the process accounting logs between systems on your internal network. If the IP spoofing attack has succeeded on one of your systems, you may get a log entry on the victim machine showing a remote access; on the apparent source machine, there will be no corresponding entry for initiating that remote access
30
How we prevent IP Spoofing?
To prevent IP spoofing happen in your network, the following are some common practices: 1- Avoid using the source address authentication. Implement cryptographic authentication system-wide Configuring your network to reject packets from the Net that claim to originate from a local address Implementing ingress and egress filtering on the border routers and implement an ACL (access control list) that blocks private IP addresses on your downstream interface. If you allow outside connections from trusted hosts, enable encryption sessions
31
Our Misconception
32
Software for IP Spoofing
Mac Spoofing Macaroni Screen Saver Bundle SpoofMAC sTerm MAC Change
33
Software to Stop IP Spoofing
StopCut Find Mac Address pro SecurityGateway for Exchange / SMTP PacketCreator Responder Pro
34
References
35
THANK YOU
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.