IP spoofing (IP address forgery or a host file hijack)

IP spoofing, also known as IP address forgery or a host file hijack, is a hijacking technique in which a cracker masquerades as a trusted host to conceal his identity, spoof a Web site, hijack browsers, or gain access to a network. Here's how it works: The hijacker obtains the IP address of a legitimate host and alters packet headers so that the legitimate host appears to be the source.

When IP spoofing is used to hijack a browser, a visitor who types in the URL (Uniform Resource Locator) of a legitimate site is taken to a fraudulent Web page created by the hijacker. For example, if the hijacker spoofed the Library of Congress Web site, then any Internet user who typed in the URL would see spoofed content created by the hijacker.

If a user interacts with dynamic content on a spoofed page, the highjacker can gain access to sensitive information or computer or network resources. He could steal or alter sensitive data, such as a credit card number or password, or install malware . The hijacker would also be able to take control of a compromised computer to use it as part of a zombie army in order to send out spam.

Web site administrators can minimize the danger that their IP addresses will be spoofed by implementing hierarchical or one-time passwords and data encryption/decryption techniques. Users and administrators can protect themselves and their networks by installating and implementating firewalls that block outgoing packets with source addresses that differ from the IP address of the user's computer or internal network.

This was last updated in June 2007

Continue Reading About IP spoofing (IP address forgery or a host file hijack)

Dig Deeper on Application attacks (buffer overflows, cross-site scripting)

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Good Afternoon, I have a question? I have received several emails from different holster, as a spoof. I am trying to find out who is sending me these emails. I am being harassed, law enforcement does not look into online harassment serious.


File Extensions and File Formats