Questions tagged [spoofing]

In networking, the term 'spoofing' is used to describe a variety of ways in which hardware and software can be fooled. There are various kind of spoofing such as IP spoofing, MAC spoofing, E-mail address spoofing, Caller ID spoofing, GPS Spoofing etc.

In networking, the term spoofing is used to describe a variety of ways in which hardware and software can be fooled. There are various kind of spoofing such as IP spoofing, MAC spoofing, E-mail address spoofing, Caller ID spoofing, GPS Spoofing etc.

IP spoofing involves trickery that makes a message appear as if it came from an authorized IP address. In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address with the purpose of concealing the identity of the sender or impersonating another computing system.

MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device.

E-mail address spoofing is an act of forging an e-mail header to make it appear as if it came from somewhere or someone other than the actual source. This technique is commonly used by spammers to hide the origin of their e-mails and leads to problems such as misdirected bounces.

Caller ID spoofing is the practice of causing the telephone network to display a number on the recipient's Caller ID display that is not that of the actual originating station.

A GPS spoofing attack attempts to deceive a GPS receiver by broadcasting a slightly more powerful signal than that received from the GPS satellites, structured to resemble a set of normal GPS signals. These spoofed signals, however, are modified in such a way as to cause the receiver to determine its position to be somewhere other than where it actually is, specifically somewhere determined by the attacker.

324 questions
-2
votes
1 answer

Is spoofing attack possible in RS232 communication?

I am a rookie in network security field. I am eager to know if it is possible for a spoofing attack on a serial communication like RS232?
user_abh
  • 357
  • 3
  • 6
  • 20
-3
votes
1 answer

Email spoofing possibility?

I would like to know if it is possible to spoof an email address like in the following scenario. If so, what other measures could I adopt in order to prevent the spoofing? Do I need to make use of SPF, DKIM, etc? If so, then how?
Angel
  • 611
  • 2
  • 10
  • 18
-3
votes
1 answer

my website contact form being used to send spoof emails

My hosting provider has contacted me and said one of the sites I have designed is sending spoof emails. Done a little bit of research but I still don't really understand how/what are they are doing to send these spoof emails. However more…
Martin Cooke
  • 526
  • 1
  • 4
  • 18
-3
votes
1 answer

ARP Spoofing in C#

I am re-writing this because my last one (which I deleted) wasn't explained properly. So, I am currently making a Network Administration tool for my school, as a self-given homework task (I am bored). It currently has the following tools: IP…
MaliciouZzHD
  • 49
  • 1
  • 12
-3
votes
1 answer

How many hosts can one network card handle

When arp spoofing an entire subnet how many hosts can a normal network card handle?
TheFlea
  • 1
  • 1
-3
votes
1 answer

postfix check the From address field matches the authenticated username or other valid aliases in LDAP

We have an internet facing MX server whereby all users authenticate their outgoing connection to submit emails via port 587. This MX server routes incoming mail for our domain to an internal postfix smtp server which then delivers mail to local imap…
-3
votes
2 answers

Stop Email Spoofing via cpanel

Someone is sending spam emails and is making it look like it was sent from my domain. How can i stop this email spoofing via cpanel. I read about SPF somehwhere. Here is what my SPF in cpanel says Your current raw SPF record is : v=spf1 +a +mx…
user3455531
  • 775
  • 1
  • 14
  • 28
-3
votes
5 answers

Sneaky SEO Solution

not really a problem more of a question. If you could tell the difference between google bot and other users browsing your site, and then you load different content in depending if it is one or the other, is there anyway google could find out? After…
Phil Jackson
  • 10,238
  • 23
  • 96
  • 130
-4
votes
2 answers

PHP: How to block the http referer for an image request?

Due to hotlink protection I'm having difficulty displaying images. The http request send in order to obtain the images contains a non empty referer header. This causes the hotlink protection to kick in. Using a referer control tool, I can block the…
Eztys
  • 31
  • 2
  • 5
1 2 3
21
22