Page 20 - security threats new-1
P. 20
An E-mail spoofing targets the user while an IP spoofing is predominantly
targeted at a network.
In an IP spoofing attack, the attacker attempts to obtain illicit and illegal
access to a network through messages with a bogus or spoofed IP address to
deceive and show it off as a message from a trusted source. This is achieved
by using a genuine host’s IP address and varying the packet headers led from
their personal system to mimic it as an original and a trusted computer’s IP
address.
DIFFERENCE BETWEEN SNIFFING AND SPOOFING
Now that we have understood what is sniffing and spoofing, the spoofing and
sniffing definition, let’s now compare packet sniffing and packet spoofing.
• During the process of sniffing, the networks’ data traffic is the main target
of the attacker who captures data packets that flows across a computer
network using packet sniffers.
Whereas in spoofing, the attacker rip-offs the authorizations of a user and
deploys those details in a system as an authentic user to unveil attacks
against network hosts, take data, disburse malware, or circumvent access
controls.
• In spoofing, the attackers use another person’s IP address to produce
TCP/IP. In packet sniffing, a sniffing program is on a part between two
interactive endpoints where the attacker pretends to be one end of the
connection to the target and snoop on files delivered between the two
endpoints.
The software or method depleted to achieve this is called a packet sniffer,
which is a function that sniffs without altering the network’s packets in any
way.