CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید





  • Foundation Topics

    IP Spoofing


    IP spoofing occurs when attackers, whether within a network or outside a network, attempt to gain access to a restricted resource by disguising the IP address of their systems as that of other systems. The system being spoofed by the attacker has access to the restricted resource and the restriction is solely based on the source IP address of the communication.

    Typically, IP spoofing is carried out by injecting data into a pre-existing communication channel between two systems to gain unauthorized access to computer systems. If attackers are not interested in the content of the responses from the target system, they can use an IP spoofing attack in a blind or unidirectional fashion in which they assume what the response from the target will be and send their information without any awareness of the response's content. For true bidirectional communication, the attacker must control the routing tables to redirect the packets for the spoofed IP address to the attacker's system.

  • / 290