Questions tagged [spoofing]

In networking, the term 'spoofing' is used to describe a variety of ways in which hardware and software can be fooled. There are various kind of spoofing such as IP spoofing, MAC spoofing, E-mail address spoofing, Caller ID spoofing, GPS Spoofing etc.

In networking, the term spoofing is used to describe a variety of ways in which hardware and software can be fooled. There are various kind of spoofing such as IP spoofing, MAC spoofing, E-mail address spoofing, Caller ID spoofing, GPS Spoofing etc.

IP spoofing involves trickery that makes a message appear as if it came from an authorized IP address. In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address with the purpose of concealing the identity of the sender or impersonating another computing system.

MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device.

E-mail address spoofing is an act of forging an e-mail header to make it appear as if it came from somewhere or someone other than the actual source. This technique is commonly used by spammers to hide the origin of their e-mails and leads to problems such as misdirected bounces.

Caller ID spoofing is the practice of causing the telephone network to display a number on the recipient's Caller ID display that is not that of the actual originating station.

A GPS spoofing attack attempts to deceive a GPS receiver by broadcasting a slightly more powerful signal than that received from the GPS satellites, structured to resemble a set of normal GPS signals. These spoofed signals, however, are modified in such a way as to cause the receiver to determine its position to be somewhere other than where it actually is, specifically somewhere determined by the attacker.

324 questions
3
votes
1 answer

How can I spoof my userAgent using a userscript?

I'm trying to visit a website but its not allowing me to do so because it doesn't support my browser. I believe it is detecting my browser through userAgent detection. So I wanted to create a userScript that would modify my userAgent so that the…
Swangie
  • 175
  • 8
3
votes
2 answers

Any idea of how to spoof an email sender in python using smtplib?

I was wasting another day of my life messing around with python and I was thinking about how to spoof an email address using smtplib in python. I thought it could be possible to spoof the from address by using the code below but it didn't work. I…
3
votes
2 answers

Faking the battery info in my laptop

How one can fake the battery info in the laptop? I am working on a tool that must fake the power of the battery in my laptop. This means that the tool must force the battery or laptop to report low power while its charged well. Is there any…
Rida
  • 41
  • 1
  • 2
3
votes
2 answers

preventing libpcap to capture the packets injected with pcap_inject()

currently thinking on a possibility to sniff at the same interface using only pcap and also inject the packets using pcap_inject. The thing can be solved easily using either: persistent checksum tracking /large slow map/, checksum tracking - until…
kagali-san
  • 2,964
  • 7
  • 48
  • 87
3
votes
3 answers

Restricting access to a site by IP

Is it safe to restrict access to a site by IP? I know there is something called "IP spoofing" - does this mean that (under some conditions) IP restriction is not accurate?
Yaron Naveh
  • 23,560
  • 32
  • 103
  • 158
3
votes
1 answer

IP spoofing with Selenium / Buying shared proxies?

I am scraping an e-commerce website with selenium, because the pages are loaded by Javascipt. Here's the workflow -: 1. Instantiate a web diver driver in virtual display mode, while sending a random user agent. Using a random user-agent decreases…
ekta
  • 1,560
  • 3
  • 28
  • 57
3
votes
1 answer

Detect forged IP address?

How do you detect if the IP address for data received via a web form has come from a spoofed IP address? If detection is possible in PHP, is there a library that will also attempt to find the real IP address?
Dave Jarvis
  • 30,436
  • 41
  • 178
  • 315
3
votes
1 answer

NTP Time Spoofing

I'm trying to send a spoofed time to a Windows machine when it requests time from the NTP server. My server so far will display packets and send back data, however I can't seem to figure out exactly what I need to send to give Windows a fake time.…
Corrosive
  • 86
  • 1
  • 11
3
votes
4 answers

xmlhttprequest to spoof referer then redirect to another page?

I've created some code using curl (PHP) which allows me to spoof the referrer or blank the referer then direct the user to another page with an spoofed referrer. However the drawback to this is the IP address in the headers will always be the IP of…
cocacola09
  • 650
  • 7
  • 14
3
votes
3 answers

Generating HttpRequest from specific IP in Java

I am using Apache HttpClient for generating Post request and submitting the data. Since remote application relays on IP address of the user that's submitting the data, I want to send post request for user specified IP address. How do I configure…
RaceBase
  • 18,428
  • 47
  • 141
  • 202
3
votes
2 answers

Block and/or Identify Fake author name/email in GIT

I want to block fake users in git commit. That means one user must not be able to change his/her email with someone else. I use gitolite. How can I implement this feature? As I have users' public keys, can I bind their email/name to that public key?
Sadi
  • 2,346
  • 4
  • 18
  • 31
3
votes
1 answer

Spoofing .net assemblies and discuss about a previously posted note

I searched for proctecting .net assemblies from spoofing and found this post very useful. However, I see a very clear contradiction in the post. In one point it is stated that strong name is not useful if the user is complicit: But if the user is…
Alireza
  • 10,237
  • 6
  • 43
  • 59
3
votes
2 answers

How to prevent other user to change gps location and Location updates called every small interval (say 3 seconds)

I've seen some application like gpsspoofer and fake gps apps that set location to spoof wrong location but my app to get right location please give suggestions. My another problem Loc.requestLocationUpdates(Provider.get(i), 600000, 1000, new…
user1448729
2
votes
2 answers

How to confirm sender of an incoming email?

Possible Duplicate: how to confirm email source I would like to know how do email services such as Hotmail and Yahoo confirm that the "From" header was not spoofed. I mean, you didn't try to send an email in behalf of someone else. I was now…
Nuno
  • 3,082
  • 5
  • 38
  • 58
2
votes
0 answers

How does django comment framework's anti-spoofing work?

In django comment framework, the CommentSecurityForm contains a 'timestamp' and a 'security_hash' field for the purpose of 'anti-spoofing', besides the commonly used CSRF toekn. What safety value does it have? I need to make a form with generic…
Xun Yang
  • 4,209
  • 8
  • 39
  • 68