Questions tagged [spoofing]

In networking, the term 'spoofing' is used to describe a variety of ways in which hardware and software can be fooled. There are various kind of spoofing such as IP spoofing, MAC spoofing, E-mail address spoofing, Caller ID spoofing, GPS Spoofing etc.

In networking, the term spoofing is used to describe a variety of ways in which hardware and software can be fooled. There are various kind of spoofing such as IP spoofing, MAC spoofing, E-mail address spoofing, Caller ID spoofing, GPS Spoofing etc.

IP spoofing involves trickery that makes a message appear as if it came from an authorized IP address. In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address with the purpose of concealing the identity of the sender or impersonating another computing system.

MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device.

E-mail address spoofing is an act of forging an e-mail header to make it appear as if it came from somewhere or someone other than the actual source. This technique is commonly used by spammers to hide the origin of their e-mails and leads to problems such as misdirected bounces.

Caller ID spoofing is the practice of causing the telephone network to display a number on the recipient's Caller ID display that is not that of the actual originating station.

A GPS spoofing attack attempts to deceive a GPS receiver by broadcasting a slightly more powerful signal than that received from the GPS satellites, structured to resemble a set of normal GPS signals. These spoofed signals, however, are modified in such a way as to cause the receiver to determine its position to be somewhere other than where it actually is, specifically somewhere determined by the attacker.

324 questions
5
votes
2 answers

Preventing spoofing of remote server with PHP & cURL

I'm writing php script that is requesting confidential data from remote server. I'm using cURL to get remote server's certificate information (for its output please below). Which array keys I need to check for certificate validity, that no one could…
Alexander M.
  • 181
  • 2
  • 10
5
votes
1 answer

Spoof IP with Perl LWP

I need to write a little piece of code to simulate traffic from different source IP addresses and I'm wondering if that can be done by spoofing the addresses with Perl? I tried Net::RAWIP and that worked, but I need to send some more complex HTTP…
blackbird
  • 1,129
  • 1
  • 23
  • 48
4
votes
2 answers

How can javascript (or a browser extension) detect the use of restricted functions?

I'm developing a scripting extension, similar to Greasemonkey or Chrome's content-script engine. This extension will allow script writers to do very dangerous things like access local files. If I ever release this extension to the public, I would…
Brock Adams
  • 90,639
  • 22
  • 233
  • 295
4
votes
3 answers

ARP Spoofing/DNS Spoofing - difference

Is there a difference between ARP Spoofing and DNS Spoofing, or they are one and the same thing?
Lyubomir Velchev
  • 962
  • 2
  • 11
  • 30
4
votes
3 answers

Using cURL to download a site's HTML source, but getting different file than intended

I'm trying to use cURL and PHP to download the HTML source (as it appears in the browser) of here. But instead of the actual source code, this is returned instead (a meta refresh link set to 0). Object moved
user954912
  • 243
  • 1
  • 5
  • 12
4
votes
3 answers

How do you spoof HTTP_REFERER?

I need to try and spoof the HTTP_REFERER passed my another page so that in the destination page, I can determine of the request is coming in from the "right" page and perform appropriate logic. How do I do that in JavaScript (AJAX)? Can I do that…
rams
  • 6,381
  • 8
  • 46
  • 65
4
votes
1 answer

Can GitHub's Repository Created Date Be Trusted?

I am teaching a software development class and I am having students submit projects to GitHub. One of my students submitted their final project and I found another repo on GitHub from 9 months earlier that contained almost identical code. Seems like…
4
votes
5 answers

How can USB vendor ID and product ID values be spoofed on OSX?

We are considering using the vendor and product ID of a USB device (obtained via IOKit) to unlock certain features of an application. I'm aware that these values can be spoofed, but I'm not sure how easily it can be done on OSX. What is involved in…
Tom Dalling
  • 23,305
  • 6
  • 62
  • 80
4
votes
2 answers

How does DKIM prevent impersonation?

I understand that DKIM can be used to prevent the spoofing of the "From:" header in an email. Email receivers can validate the DKIM-Signature to verify the "From:" header. DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; **d=example.com**;…
InfoBill
  • 41
  • 1
4
votes
6 answers

DoS attack from google ip range

I believe I've been attacked with multiples request (5/sec all day long) from google ip range (66.249.65.* - maybe a ip spoofing??). This requests have googlebot signature (Googlebot/2.1; +http://www.google.com/bot.html) on http header, but it try…
Fulvius
  • 511
  • 6
  • 15
4
votes
1 answer

Spoof Origin header in Node.js

I have a node.js server running express. I'm trying to write several tests for it in order to confirm standard behavior in the future when someone else may work on it. The server processes the request's header, the referrer and origin fields…
Adno
  • 203
  • 3
  • 10
4
votes
2 answers

ARP Request in C#

I'm trying to make my Android Device think that I'm the router, using a simple ARP request in C# (Sending the arp from my laptop to my android device with C#). I thought that if i'll use SendArp Method (from Iphlpapi.dll), it'l…
albeck
  • 510
  • 1
  • 7
  • 16
4
votes
1 answer

How can I prevent external entity from rejecting emails from a test server?

I am currently working with a client that allows users to generate emails, which are sent to the client's mail server, where they are parsed, content language is added, and they are resent to the recipient. So, my server basically sends the…
Eric Belair
  • 10,574
  • 13
  • 75
  • 116
3
votes
3 answers

Identify fake UDP Packet

I want to identify an UDP or TCP packet that have its source IP address faked. My guess is that even if the packet is faked with a program such has hping, the MAC src address is still the same on all the faked packets, is this correct? If my idea is…
3
votes
1 answer

Identifying client IP from AWS ALB's X-Forwarded-For header while avoiding spoofing

According to AWS' documentation on the ALB and the X-Forwarded-For header, the client IP is the left-most (so proxies would follow on the right): The left-most address is the client IP address where the request was first made. However, if the user…
julian
  • 378
  • 2
  • 7
  • 19
1 2
3
21 22