You are here:Home » Abstracts » Abstract On IP Spoofing

Abstract On IP Spoofing


"IP spoofing is a method of attacking a network in order to gain unauthorized access. The attack is based on the fact that Internet communication between distant computers is routinely handled by routers which find the best route by examining the destination address, but generally ignore the origination address. The origination address is only used by the destination machine when it responds back to the source.
In a spoofing attack, the intruder sends messages to a computer indicating that the message has come from a trusted system. To be successful, the intruder must first determine the IP address of a trusted system, and then modify the packet headers to that it appears that the packets are coming from the trusted system.
In essence, the attacker is fooling (spoofing) the distant computer into believing that they are a legitimate member of the network. The goal of the attack is to establish a connection that will allow the attacker to gain root access to the host, allowing the creation of a backdoor entry path into the target system."

Please share this article if you like it! Bless me or curse me in comments! Thank you for reading anyway!
The author and CEO of Amfas Tech

About The Author:

Sasidhar Kareti is a tech savvy and the founder of He is a passionate blogger and he loves to write about Technologies, Blogging, SEO, Internet Marketing, Web, Software Design & Development issues.
Follow him on Facebook | Twitter | Google+ | Pinterest


Post a Comment

We're happy to read your thoughts and we'd try our level best to clear your queries if asked. Let's discuss it in a better way. Please don't spam and spoil the conversation :) Thank you!!