Spoofing attack

Spoofing (English for manipulation, concealment or pretense ) is called in the information technology, various attempts at deception in computer networks to conceal one's identity. People are also sometimes referred to in this context as " Spoofer ".

Previously was spoofing exclusively for the trial of the attacker to spoof IP packets so that they bore the return address of another ( sometimes trusted ) hosts. This method, however, was later applied to other data packets. Nowadays spoofing includes all the methods with which can undermine authentication and identification methods based on the use of trusted addresses or host names to network protocols.

Particular importance spoofing now (2006/2007) has obtained in the context of Web applications - Keyword: phishing. The newer activities with illegal background mainly include spoofing by phone, called Call ID spoofing. Concepts such as content spoofing, link spoofing, Frame spoofing, etc. are explained below URL spoofing.

In detail we differ:

  • ARP Spoofing
  • DHCP Spoofing
  • DNS Spoofing
  • IP spoofing
  • MAC spoofing
  • Mail spoofing
  • URL spoofing
  • Call ID Spoofing
  • GPS spoofing is a method to entice GPS receiver to an incorrect location determination.
  • Vulnerability
219462
de