Questions tagged [spoofing]

In networking, the term 'spoofing' is used to describe a variety of ways in which hardware and software can be fooled. There are various kind of spoofing such as IP spoofing, MAC spoofing, E-mail address spoofing, Caller ID spoofing, GPS Spoofing etc.

In networking, the term spoofing is used to describe a variety of ways in which hardware and software can be fooled. There are various kind of spoofing such as IP spoofing, MAC spoofing, E-mail address spoofing, Caller ID spoofing, GPS Spoofing etc.

IP spoofing involves trickery that makes a message appear as if it came from an authorized IP address. In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address with the purpose of concealing the identity of the sender or impersonating another computing system.

MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device.

E-mail address spoofing is an act of forging an e-mail header to make it appear as if it came from somewhere or someone other than the actual source. This technique is commonly used by spammers to hide the origin of their e-mails and leads to problems such as misdirected bounces.

Caller ID spoofing is the practice of causing the telephone network to display a number on the recipient's Caller ID display that is not that of the actual originating station.

A GPS spoofing attack attempts to deceive a GPS receiver by broadcasting a slightly more powerful signal than that received from the GPS satellites, structured to resemble a set of normal GPS signals. These spoofed signals, however, are modified in such a way as to cause the receiver to determine its position to be somewhere other than where it actually is, specifically somewhere determined by the attacker.

324 questions
2
votes
1 answer

How do I upload a csv file on Windows using Paperclip paperclip 4.3.2

There is this well known issue with Paperclip. https://github.com/thoughtbot/paperclip/issues/1924 How do I configure my model so that this stupid spoofing validation will work? Before the problem was discovered I was…
ruby_object
  • 1,229
  • 1
  • 12
  • 30
2
votes
2 answers

Sending an alias(spoof) for the 'from' e-mail using python smtplib

I am using python 3.4.3 to send e-mail, and at this time I will be needing the e-mail to be sent under an alias. The account is a gmail account, but I need to be able to put whatever I want as the spoof(alias) 'From' e-mail. I have looked quite hard…
dubkoidragon
  • 21
  • 1
  • 5
2
votes
1 answer

IP address spoofing using SharpPcap on C#

I will use SharpPcap framework to make my spoofing program, so I need to edit my machine's IP address of the packet with another IP address on the source address field. I found some example on SharpPcap project, but how can I edit or change the…
SomeOne
  • 71
  • 2
  • 4
2
votes
4 answers

$_SERVER['REMOTE_HOST'] empty for some users

I have activated HostnameLookups Double in my Apache2 configuration, so that I can store user's remote hosts and rest assured that their IP addresses are real and not spoofed. However, I noticed that for quite a few of my 'users' (people entering…
user1111929
  • 6,050
  • 9
  • 43
  • 73
2
votes
1 answer

Django: What is the most proper value for ALLOWED_HOSTS?

Question 1 As I know, django has ALLOWED_HOSTS option in settings.py to prevent from spoofing attacks. However, I don't know which one is the most proper value for ALLOWED_HOSTS among case 1~3. (Or all of them make same result?) Case 1 :…
Chemical Programmer
  • 4,352
  • 4
  • 37
  • 51
2
votes
1 answer

Spoofing real image url

For a large high traffic newswebsite we want to start spoofing the direct links to all the photos. There for we want to create dynamic urls, like Twitter does on there images: https://pbs.twimg.com/media/Bv_wkiyCUAA0E6f.jpg:large The same counts for…
Tim Hanssen
  • 167
  • 1
  • 1
  • 9
2
votes
1 answer

SMS spoofing (PDU)?

I was trying to replace the sender address with an alphanumeric text by adding a UDH to the PDU string? Unfortunately this didn't work. Maybe because the spoofed address is being replaced by the SMSC?
user2943268
  • 85
  • 10
2
votes
2 answers

PHP form spoofing and validation

I've been reading about form spoofing and just couldn't understand why is it so important to prevent it when we can assure that the passed value(s) are properly validated? Perhaps I'm missing something here, but here's an…
Onion
  • 1,714
  • 1
  • 23
  • 42
2
votes
3 answers

HTTP Spoofing?

I have two questions: 1) In PHP, when a programmer uses the "REMOTE_ADDR" variable to get the IP address of the web client, that IP address is taken from a field in the HTTP header? Or from where? 2) If the IP address of the client is taken from…
Arcuspedes
  • 31
  • 1
  • 3
2
votes
5 answers

Links that don't pass referrer

I want to create a list of links opening the targets in new tabs from my private page and I don't want the referring URL to be passed on. I tried the following method, but it didn't solve the problem: