Foundation Topics
IP Spoofing
IP spoofing occurs when attackers, whether within a network or outside a network, attempt to gain access to a restricted resource by disguising the IP address of their systems as that of other systems. The system being spoofed by the attacker has access to the restricted resource and the restriction is solely based on the source IP address of the communication.Typically, IP spoofing is carried out by injecting data into a pre-existing communication channel between two systems to gain unauthorized access to computer systems. If attackers are not interested in the content of the responses from the target system, they can use an IP spoofing attack in a blind or unidirectional fashion in which they assume what the response from the target will be and send their information without any awareness of the response's content. For true bidirectional communication, the attacker must control the routing tables to redirect the packets for the spoofed IP address to the attacker's system.