Questions tagged [spoofing]

In networking, the term 'spoofing' is used to describe a variety of ways in which hardware and software can be fooled. There are various kind of spoofing such as IP spoofing, MAC spoofing, E-mail address spoofing, Caller ID spoofing, GPS Spoofing etc.

In networking, the term spoofing is used to describe a variety of ways in which hardware and software can be fooled. There are various kind of spoofing such as IP spoofing, MAC spoofing, E-mail address spoofing, Caller ID spoofing, GPS Spoofing etc.

IP spoofing involves trickery that makes a message appear as if it came from an authorized IP address. In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address with the purpose of concealing the identity of the sender or impersonating another computing system.

MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device.

E-mail address spoofing is an act of forging an e-mail header to make it appear as if it came from somewhere or someone other than the actual source. This technique is commonly used by spammers to hide the origin of their e-mails and leads to problems such as misdirected bounces.

Caller ID spoofing is the practice of causing the telephone network to display a number on the recipient's Caller ID display that is not that of the actual originating station.

A GPS spoofing attack attempts to deceive a GPS receiver by broadcasting a slightly more powerful signal than that received from the GPS satellites, structured to resemble a set of normal GPS signals. These spoofed signals, however, are modified in such a way as to cause the receiver to determine its position to be somewhere other than where it actually is, specifically somewhere determined by the attacker.

324 questions
-1
votes
1 answer

Can someone spoof a websocket connection?

In the case where its beeing used a websocket protocol between a client (webpage) and a server. Is it possible for third parties to spoof the connection in the handshake or even after the connection has been established?
Bruno.S
  • 109
  • 1
  • 7
-1
votes
2 answers

Is it possible to send packets using spoofed public IP?

Is it possible to send a web packet using a spoofed public IP (Custom source IP header) to a server (Raspberry Pi), and have the Pi log the packet. The response is not important, nor is the method used(TCP, UDP, HTTP), only the initial one way…
Mr_IO
  • 43
  • 5
-1
votes
1 answer

Is it safe to add IP address to SPF record

I am a programmer who manages online exchanges user also for and i have been asked by to add IP address to SPF record v=spf1 +ip4:xxx.xxx.xxx.xxx include:spf.protection.outlook.com -all so that emails send from that application are accepted by the…
Learning
  • 19,469
  • 39
  • 180
  • 373
-1
votes
1 answer

Faking $_SERVER[‘REMOTE_ADDR’] in intranet?

I've looked around for an answer to this question, but the answers are always situational - so here's mine: If a hacker is on a limited, local network, can they fake the IP in $_SERVER[‘REMOTE_ADDR’]? (and out of curiosity - how?) I understand that…
IamPancakeMan
  • 199
  • 1
  • 10
-1
votes
1 answer

IP Spoofing using Apache Traffic Server

Can we achieve IP-Spoofing via Apache Traffic Server ? Name of parameter in records.config and any other conf file will be really helpful.
vijay sharma
  • 131
  • 11
-1
votes
1 answer

Is there a way to spoof rooted android's light sensor values

Since Samsungs, note 4 in particular have an ultra bright screen mode (750nits) that automatically activates when the device is exposed to direct sun light I am wondering if in some way I can change the reading of the light sensor so I trick it into…
Biser A.
  • 154
  • 1
  • 13
-1
votes
1 answer

WhatsAPI how to manually send my lastseen to the whatsapp server

WhatsAPI how to manually send my lastseen to the whatsapp server may be to a previous date? I'm Using whats app api from https://github.com/shirioko/WhatsAPINet
Ivan Lewis
  • 740
  • 1
  • 9
  • 19
-1
votes
3 answers

Unrooted smartphone with changed IMEI on android

I'm developing an android project to control users access. I use IMEI number like user-login, because I need users can use only one device to access, but I'm worried about IMEI cloning. I'd want to implement a booted phone control to be sure IMEI is…
Baloth89
  • 11
  • 1
-1
votes
2 answers

PHP form spoofing code

I have the following code which should prevent form spoofing. A token is used to match and ensure that the form submitted is from that page.. if (isset($_POST['Submit'])) { if (!isset($_POST['token']) || $_POST['token'] != $_SESSION['token']) { …
virs90
  • 31
  • 4
-1
votes
1 answer

How to force all request to come from my website to avoid spoofing using Apache

My website got spoofed, and I don’t want other domains to get my site info/data through http requests anymore. How can I deny all request that came from outside my website? Thanks!
content01
  • 3,115
  • 6
  • 41
  • 61
-1
votes
1 answer

How to force all request to come from my website to avoid spoofing in RoR 3.2

my site just got spoof. I'm using RoR 3.2.11 and I installed the rack-rewrite gem. I created the /middleware dir inside /app and I created a .rb file inside. Now, how should I write the rule to only allow requests coming from my page? Thanks!
content01
  • 3,115
  • 6
  • 41
  • 61
-2
votes
1 answer

Spoof the phone number for a text from an iOS device

so I am working on a project that requires anonymous reporting via text message. Instead of the user showing their number when sending a text, they can choose to (paid option) send it with an anonymous number to the person they are trying to…
Ethan
  • 1,905
  • 2
  • 21
  • 50
-2
votes
1 answer

How do companies such as Gmail detect email spoofing

If you send a spoof email to a Gmail account, Gmail detects this somehow, and puts this email in your "spam" folder. How does this work?
Barney Chambers
  • 2,720
  • 6
  • 42
  • 78
-2
votes
3 answers

IP address spoofing

Is it true that, if I want to make an IP spoofing program, I need only a program that can change my machine IP address? If true how can I use System.Net - IPAddress Class to set the ip address?
SomeOne
  • 71
  • 2
  • 4
-2
votes
2 answers

Writing a UDP packet forger in PHP

I am working on an UDP spoofer written in PHP and I wanted to know how can I forge those packets. Any help is appreciated. Thank you!
TheBlackTiger
  • 313
  • 3
  • 9
1 2 3
21
22