Wednesday, September 21, 2005

Spoofing Attack

What Is a Spoofing Attack?

A spoofing attack involves nothing more than forging one's source address. It is the act of using one machine to impersonate another. To understand how this occurs, you must know a bit about authenticities.

The better portion of authentication routines known to the average user occurs at the application level. That is, these methods of authentication are entirely visible to the user.
The typical example is when a user is confronted with a password prompt on FTP or Telnet. The user enters a username and a password; these are authenticated, and the user gains access to the resource.

On the Internet, application-level authentication routines are the minority. Each second, authentication routines that are totally invisible to the user occur. The difference between these routines and application-level authentication routines is fundamental. In application-level authentication, a machine challenges the user; a machine requests that the user identify himself. In contrast, non-application-level authentication routines occur between machines. One machine demands some form of identification from another. Until this identification is produced and validated, no transactions occur between the machines engaged in the challenge-response dialog. Such machine-to-machine dialogs always occur automatically (that is, they occur without human intervention).

In the IP spoofing attack, the cracker attempts to capitalize on the automated nature of the dialog between machines. Thus, the IP spoofing attack is an extraordinary method of gaining access because in it, the cracker never uses a username or password. This, for many people, is difficult to grasp. Consequently, reports of IP spoofing have needlessly caused much fear and paranoia on the Internet.

Disediakan Oleh: Wong How Ling (A108917)

3 Comments:

Blogger Barry said...

Watson 2.0 Slated for Release Today
Search company Intellext is positioning its Watson 2.0 desktop search program as an alternative to ... Intriguingly, a Blogs tab offers relevant blog results - which could be the killer feature.
Hi, I was just blog surfing and found you! If you are interested, go see my car rental related site. It isnt anything special but you may still find something of interest.

9:47 PM  
Blogger Lester said...

Blog Faces Suit Over Reader Comments
OTHER FREE FEATURES Rita's Wrenching Exodus Evacuees clogged roadways as Rita bore down on the Gulf Coast.
You have a great blog here. I don't maintain a good blog, but I do run a home furnishings site. It highlights quality home furnishings, apparel and gift sites. Stop by when you have a chance.

9:50 PM  
Blogger vivian said...

PRESS RELEASE: work at home

Exploding Internationally Business. Full Training Given.
work at home
work at home site.
Come and check it out if you get time :-)

Adrian: Go to google or Yahoo News and search "What Is the Best Work From Home Prospect and Why?"

8:04 AM  

Post a Comment

<< Home