// meta tag IP Spoofing Attack – Hackers Enigma

IP Spoofing Attack

Internet Protocol i.e IP addresses are unique and used for digital data communication for internet. Any mailing system or website technology works on the same principle of digital communication.

IP Spoofing

Every computer connected to Network have its unique IP address.

When Person A sends an email  to person B, The mail is assigned with the header which contains the IP’s of sender and Reciver so that mail can go to the same person B and not to some one else.

Now in a private network for security reasons limited mails are accpeted from reserved IP’s.

In Simple word only internal communication can be worked. Person from outside can’t send mail in that network.

So if attacker wants send the mail inside, He will spoof the IP.

He first will sniffs the data packets in the internal communication adn steal some internal email.

Then he will perform changing in header of the mail. he will change content of the mail and send this mail to network again.

System cant provide security against this because it have internal fake IP.

This is how fake IP  is created and attack of spoofing is done.

Thank You all For Reading.

2 Comments

  1. Avatar
    Stephan Novida April 02, 2010

    Wow, exactly what I was looking for! I am always scouring Google trying to find things and I have been looking for over an hour and I finally found what I was looking for! Your blog has definitely made me really happy. So I have bookmarked your page and I will definitely return later on.

  2. Avatar
    abhix May 22, 2010

    amagzing. . .with fact only fact in a ethical way. . . WOW

Leave reply

<