Introduction to IP Spoofing

by Victor Velasco
Sept. 1, 2017 0 comments SANS Institute threats/vulnerabilities

This paper describes the use of IP spoofing as a method of attacking a network in order to gain unauthorized access . The attack is based on the fact that Internet communicatio n between dis tant computers is routinely handled by routers which find the bes t route by examining the destination address , but generally ignore the origination address . The origination address is only used by the destination machine when it responds back to the source.