Questions tagged [spoofing]

In networking, the term 'spoofing' is used to describe a variety of ways in which hardware and software can be fooled. There are various kind of spoofing such as IP spoofing, MAC spoofing, E-mail address spoofing, Caller ID spoofing, GPS Spoofing etc.

In networking, the term spoofing is used to describe a variety of ways in which hardware and software can be fooled. There are various kind of spoofing such as IP spoofing, MAC spoofing, E-mail address spoofing, Caller ID spoofing, GPS Spoofing etc.

IP spoofing involves trickery that makes a message appear as if it came from an authorized IP address. In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address with the purpose of concealing the identity of the sender or impersonating another computing system.

MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device.

E-mail address spoofing is an act of forging an e-mail header to make it appear as if it came from somewhere or someone other than the actual source. This technique is commonly used by spammers to hide the origin of their e-mails and leads to problems such as misdirected bounces.

Caller ID spoofing is the practice of causing the telephone network to display a number on the recipient's Caller ID display that is not that of the actual originating station.

A GPS spoofing attack attempts to deceive a GPS receiver by broadcasting a slightly more powerful signal than that received from the GPS satellites, structured to resemble a set of normal GPS signals. These spoofed signals, however, are modified in such a way as to cause the receiver to determine its position to be somewhere other than where it actually is, specifically somewhere determined by the attacker.

324 questions
0
votes
1 answer

How do I send HTTP request on behalf of some other machines in my local network?

I have a local network, I can monitor all traffics there. Bandwidth for each user is limited, and usually all computers are NOT using their total bandwidth. So, if I can find a way to send requests on their behalf, then I can increase my bandwidth…
Mostafa Shahverdy
  • 2,687
  • 2
  • 30
  • 51
0
votes
1 answer

Spoofing an echo reply

Given that I'm on a local network, if I can capture a ICMP echo request packet, and considering that I want to spoof a echo reply, what part of the original packet would I need to change supposing I make a copy of the original before i send it back?…
Jake
  • 2,877
  • 8
  • 43
  • 62
0
votes
1 answer

How spoof source address in Ruby?

I am working on a small piece of code that will just receive UDP SNMP traps, and forward them to multiple locations, but the source address information needs to be intact. Otherwise all the traps will appear to be coming from the system running…
Douglas Mauch
  • 859
  • 2
  • 7
  • 18
0
votes
2 answers

What is the actual use of mac address on internet?

I was learning about spoofing attacks and now confused on IP and MAC addreses. I learned that every packets(TCP, ICMP, etc..) send from a computer have an Ethernet header which contain mac address of source and destination (Hope I'm right). Is mac…
Rahul K
  • 665
  • 10
  • 25
0
votes
1 answer

Preventing an iOS app from getting mock locations

Is it possible to make sure that GPS positions an iOS app is getting are real, and they are not fake locations illegitimately provided somehow, for example, by means of another app such as LocationHolic? Thanks!
AppsDev
  • 12,319
  • 23
  • 93
  • 186
0
votes
1 answer

Winpcap packet forwarding. Java wrapper

I am trying to build a winpcap application capable of sniff traffic of a target host within a switch-based LAN. To carry out this, I am trying to perform a arp spoofing. This way, messages between the target host and the getaway will be sent through…
0
votes
2 answers

How can I dynamically set the source IP address when my machine makes a DNS query?

PushToTest does performance testing for Social/Mobile Web apps. For example, We used 20 AWS EC2 c1.medium instances to generate 50,000 user transactions in a 10 minute period. Our TestMaker software is Java and runs on EC2/Centos, Windows, Linux,…
0
votes
1 answer

ARP reply packet does not update ARP cache on Ubuntu

So after I have played with the Network Spoofer developed by Digitalsquid (http://digitalsquid.co.uk/netspoof/), I have been trying to get a better understanding of its internal working by writing a c program that does something similar. My…
user1589408
  • 21
  • 2
  • 6
0
votes
0 answers

GPS Signal Strength

Possible Duplicate: How to measure GPS signal strength on Android? Is there a way to measure or determine the strength (and perhaps further propoerties) of the gps signal for each gps satellite in view on a android smartphone? The API does only…
htz
  • 1,037
  • 1
  • 13
  • 37
0
votes
1 answer

Mac spoof HTTP response

If a program sends a http request, is there a way to spoof the data returned by the request? For example: Program that sends name to server to check for permission: http://example.com/test.php?name=Stackoverflow Actual Response: HI Response I want…
LanguagesNamedAfterCofee
  • 5,782
  • 7
  • 45
  • 72
0
votes
4 answers

What is the best way to make TCP and UDP packet spoofing and injection?

Hy folks, I'm kinda new to low level networking. I need to intercepts all TCP/UDP packets and potentially filter or substitute them with new ones. What would be the best way to intercept these packets and inject new one? I'm only targeting Windows…
Lotfi
  • 1,205
  • 8
  • 18
0
votes
1 answer

How can I distinguish "my" spoofed traffic from normal traffic?

I'm sending spoofed packets from a server to a client. My goal is to replay original traffic (say, traffic from google.com) from a different machine to the same host. Therefore a packet sent by my server will have the IP source address of whatever…
Ricky Robinson
  • 21,798
  • 42
  • 129
  • 185
-1
votes
3 answers

Can you use ARP-Poisoning (spoofing) to apply simulated external effects?

We are looking at ways of creating a network effects server. By this I mean a central server that will inspect all the packets on the network and apply logic (drop, delay, alter, etc) based on factors external to the actual network such as weather…
Erich Mirabal
  • 9,860
  • 3
  • 34
  • 39
-1
votes
1 answer

Unauthorized domain name spoofing

I have a domain (let it be sample.test). I connected it to the Cloudflare platform. One day I decided to check Google Search Console and I found out there was another (completely unrelated to me) domain that redirected all requests from him to…
-1
votes
3 answers

SPF record insecure configuration

v=spf1 include:spf.falconide.com include:sendgrid.net include:_spf.google.com ip4:xx.xxx.xxx.x ~all Above is my SPF record for my domain, I am using an external tool to get open-source threat intelligence, in the tool it says my SPF config is not…
wayne
  • 393
  • 2
  • 13