Thursday, October 16, 2014

IP Spoofing

IP spoofing is one of the techniques that are widely used on the internet to conceal or falsify the source IP address so that the origin of the packet network can not be tracked or to trick the destination computer.

Ip spoofing analogy is as follows: Imagine you want to send a threatening letter to someone, and you certainly do not want people who you threaten to know that a threatening letter was from you. So what you do is send a letter with the name and address of another person so that you will be safe and untraceable.

Why do people do IP spoofing? There are two goals less than both commonly associated with the use of IP spoofing:

1. Submitting a package of garbage in large quantities in order to experience the destination computer overload. Imagine someone sending anonymous letters in the hundreds or even thousands of course this will make you angry that you might throw away all your letters, whereas among the piles of junk mail, there are some important letters.

2. Fool the destination computer so that he would think that the packets sent from the computer that can be trusted. Imagine you received a letter from the village and bearing the Jakarta government, contains notices of new legislation that will be charges a fee for the malaria mosquito spraying by 10 thousand. Of course, if tomorrow somebody comes to collect, there will not be suspicious and give the money, even though that person is a fake officer who had sent a fake letter the day before.

Two things are common scenarios with respect to IP spoofing, but in practice in the IT world, there are various possibilities where IP spoofing techniques can be applied. I hope the concept of IP spoofing can already understand, now let's see in detail, what is happening in the network when the IP spoofing occurs.

Examples of Normal Communication In normal situations, to communicate in the network each data packet must have a label sender / from / source and destination / to / destination. The figure below shows the normal communication that occurs where the sending computer uses the correct information about himself as the sender, this will facilitate the communication server to answer that ensued.

Related Posts:

  • Software PiracySoftware piracy is the unauthorized copying of software. Most retail programs are licensed for use at just one computer site or for use by only one user at any time. By buying the software, you become a licensed user rather t… Read More
  • CD-RW (Compact Disk – ReWritable) diskIt is short for CD-ReWritable disk, a type of CD disk that enables you to write onto it in multiple sessions. One of the problems with CD-R disks is that you can only write to them once. With CD-RW drives and disks, you can t… Read More
  • Warm BootWarm boot refers to restarting a computer that is already turned on via the operating system. Restarting it returns the computer to its initial state. A warm boot is sometimes necessary when a program encounters an error from… Read More
  • LANs, WANs, MANs, and VLANsThe next type of network is called a Wide Area Network or WAN. Follow closely: WANs can connect several LANs and they tend to span across geographical territories such as cities, states, regions, and sometimes countries. WANs… Read More
  • Automate Your Updates of Windows DriversWindows device drivers often cause problems. You need to install a large number of drivers and also keep on upgrading them once new versions are released. Just getting audio to work with all applications can sometimes take ve… Read More

0 comments: