Spoofing Attack: Surafiel Habib Asefa
Spoofing Attack: Surafiel Habib Asefa
Spoofing Attack: Surafiel Habib Asefa
By:-
Surafiel Habib Asefa
1 02/15/2021
Outlines
Introduction
Types of Spoofing Attack
ARP Spoofing Attack
IP Spoofing Attack
Web Spoofing Attack
Email Spoofing Attack
GPS Spoofing Attack
2 02/15/2021
Introduction
5 02/15/2021
Types of Spoofing Attack
6 02/15/2021
ARP Spoofing Attack
7 02/15/2021
Cont’d
8 02/15/2021
Cont’d
9 02/15/2021
ARP Spoofing Prevention and Detection
Methods
10 02/15/2021
Cont’d
11 02/15/2021
Cont’d
12 02/15/2021
Internet Protocol (IP) Spoofing
Internet Protocol (IP) – a set of rules that dictate how data should be delivered over
the public network (Internet).
The concept of IP spoofing was discovered as a security weakness in the protocol
which carries the Source IP address and the TCP protocol which contains port and
sequencing information.
IP routing is a step by step process.
A TCP/IP network packet contains several pieces of information, including the data it
is carrying, source and destination IP addresses, and other constraints required for
quality of service and packet handling.
Every IP packet is routed separately.
The route of an IP packet is decided by all the routers the packet goes through.
13 02/15/2021
Cont’d
14 02/15/2021
How does IP Spoofing work?
A user accesses the Internet from his/her local computer which has the IP
address “192.168.0.5”.
When an IP spoofing attack occurs, this address is hidden and the user sends
the packets indicating the spoofed IP address “192.168.0.6” which is an
authorized IP address.
These IP addresses (192.168.0.5 & 192.168.0.6) are used to identify each
computer in the network.
In Internet communication, the data is transferred in the form of packets.
The client sends web requests in the form of data packets to the server and the
webserver sends back the responses in the form of data packets.
15 02/15/2021
Cont’d
When a client sends a packet to the server, the packet will have the IP
address of the computer it is coming from.
When an IP spoofing attack occurs, the source details that IP address which
specifies the sender of the packet is not actual, but a fake IP address which is
permitted to access the website.
This will make the server handle the request packet as it is coming from the
permitted user.
Thus the server grants access to the attacker and it can cause various security
threats.
This is how the IP spoofing works.
16 02/15/2021
Types of attacks implemented
through the IP spoofing
17 02/15/2021
Cont’d
Blind Spoofing
The attacker is not aware of all network conditions.
The sequence and acknowledgement numbers from the victim are unreachable.
Sequence of numbers are generally used to assemble packets in the order in which they
intended to read the packets.
i.e., in the order of packet 1 to be read first, then packet 2 and then packet 3.
The attacker sends several packets to the victim machine to receive a sequence
of numbers.
The attacker can inject data into the stream of packets without having
authenticated himself when the connection was first established.
18 02/15/2021
Cont’d
Non-Blind Spoofing
In this type of attack the attacker and victim resides on the same subnet.
The sequence and acknowledgement numbers can be sniffed, eliminating the
potential difficulty of calculating them accurately.
The biggest threat of spoofing in this instance would be session hijacking.
Session Hijacking is accomplished by corrupting the DataStream of an established
connection.
Then re-establishing it based on correct sequence and acknowledgement numbers
with the attack machine.
Using this technique, an attacker could effectively bypass any authentication
measures taken place to build the connection.
19 02/15/2021
Cont’d
20 02/15/2021
Cont’d
Man-in-the-middle-attack
The attacker intercepts the packets sent by the systems, When two legitimate
parties are communicating with each other.
The attacker host then controls the flow of communication.
It can eliminate or alter the information sent by one of the original participants
without the knowledge of either the original sender or the recipient.
an attacker can fool a victim into disclosing confidential information by
“spoofing” the identity of the original sender, who is presumably trusted by the
recipient.
21 02/15/2021
How to Prevent IP Spoofing?
23 02/15/2021
Web Spoofing Attack
24 02/15/2021
Types of Web Spoofing
25 02/15/2021
Cont’d
URL spoofing attack:
Is the process of creating a fake or forged URL which impersonates a legitimate and
secure website.
The spoofed URL or website address looks exactly like the original and safe URL
The attacker not only creates a fake and forged URL, but he also builds a website that
looks exactly like the original website.
Forged URLs are also posted on other websites that are not harmful at all but they
contain spoofed and forged links that would eventually lead the user to a dangerous
website.
The website asks you to enter your username, password, credit card number, or
whatever information the attacker wants to extract using that spoofed URL.
Example, AMAZ0N.COM (instead of the letter O an attacker may use the digit 0).
26 02/15/2021
How to detect a spoofed
Webpage
URL
URL is the easiest way to detect the attack!
Triple check the spelling of the URL.
Look for small differences such as a hyphen (-) or an underscore (e.g.
ethiosport.com vs. ethio-sport.com).
Mouse over message this can be spoofed too.
Beware of pages that use server scripting such as php, these tools make
it easy to obtain your information.
Beware of java scripting as well.
Beware of longer than average load times.
27 02/15/2021
Signs for Web spoofing Victim
28 02/15/2021
How Web Spoofing Works?
Explain Demo….
29 02/15/2021
Email Spoofing Attack
31 02/15/2021
Cont’d
Email spam, also known as junk email, is unwanted bulk messages sent
through email.
Recipients of spam often have had their email addresses obtained by spambots.
A spambot is a program designed to collect, or harvest, e-mail addresses from
the Internet in order to build mailing lists for sending unsolicited e-mail (Spam).
Spammers use spambots to create email distribution lists.
Email distribution list is a group of email recipients that is addressed as a single
recipient.
A spammer typically sends an email to millions of email addresses.
32 02/15/2021
Recognize spoofed email
33 02/15/2021
Spoofed Email: Demo
34 02/15/2021
GPS Spoofing
These spoofed signals may be modified in such a way as to cause the receiver to estimate its
position to be somewhere other than where it actually is.
One common form of a GPS spoofing attack, commonly termed a carry-off attack, begins by
broadcasting signals synchronized with the genuine signals observed by the target receiver.
The power of the counterfeit signals is then gradually increased and drawn away from the genuine
signals.
35 02/15/2021
Thank You!
Any question?
36 02/15/2021