Skip to main content

IP Spoofing

Generally data is sent over network using IP addresses , in IP spoofing the hacker changes the IP address of destination to itself and behaves as if it is original destination also replies to the source to make it unknown about changes. Also he can just become source for original destination IP and become a mediator to pass data between them and use information he wants.



It is generally used for Denial-of-service attacks .In which the goal is to overwhelm the computer with traffic to stop its services. The attacker does not care about receiving responses to the attack packets. Packets with spoofed addresses are thus suitable for such attacks. They have additional advantages for this purpose they are more difficult to filter since each spoofed packet appears to come from a different address, and they hide the true source of the attack.

Any service that uses IP address for authentication can be vulnerable to this attack.You can use filtering techniques to defend against it such as: packet filtering, ingress filters, egress filtering.Also techniques like Reverse Path Forwarding, Hop count filtering, Path identification can help prevent such attacks up to some extent.

Comments

Popular posts from this blog

Quiz 1 : Mobile Application Development - Android

Download PDF Version From Here   MCQ 1. Select a component which is NOT part of Android architecture. a. Android framework   b. Libraries          c. Linux kernel   d. Android document 2. What is AAPT? a. Android Asset Processing Tool.             b. Android Asset Providing Tool.   c. Android Asset Packaging Tool.             d. Android Asset Packaging Technique 3. Required folder when Android project is created. a. build                 b. build/               c. bin     d. bin/ 4. Adb stands for   A. Android Drive Bridge.                              B. Android Debug Bridge.            C. Android Destroy Bridge.                          D. Android Delete Bridge. 5. Is list data type supported by AIDL? a. Yes    b. No 6. Component which is NOT under the Android application. a. Content providers      b. Resource externalization         c. Applications d. Notifications 7. Language which is supported by Android for application dev

Never try to go back and repair the past which is impossible. But be prepared to construct the future which is possible.

Never try to go back and repair the past which is impossible. But be prepared to construct the future which is possible.

Computer problems : Some Information and Knowledge Base

Computer problems are not new to a person with a regular PC at home or at work. Problems can range from simple problems such as frozen screens and the dungeons of the main issues to work as falling food and hard disk crash. A long list of computer problems are bound to occur, some of which can be easily eliminated by turning off the computer and clicking Restart. However, there are other serious issues that can not be solved without the help of an experienced or a professional. If you find a problem like this, you can always consider calling the IT professional to get their problem solved, but just before placing callers you would do well to analyze all common computer problems and see if they can solve the problem itself. In situations that require professional intervention, such as a virus attack, it would be prudent to take a back seat of your system and to appeal to professionals. Contrary to the thinking of many people where computers are considered magical machinery, computer