Anti Spoofing
Anti Spoofing
Anti Spoofing
What is Spoofing?
• IP address spoofing is one of the most frequently used spoofing attack methods.
• An attacker sends IP packets from a false (or “spoofed”) source address in order
to disguise itself.
• ARP is short for Address Resolution Protocol, a protocol that is used to resolve IP
addresses to MAC (Media Access Control) addresses for transmitting data.
• In this attack, a malicious party sends spoofed ARP messages across a local
area network in order to link the attacker’s MAC address with the IP address of a
legitimate member of the network.
• ARP spoofing only works on local area networks that use the Address Resolution
Protocol.
• The Domain Name System (DNS) is a system that associates domain names
with IP addresses.
• In a DNS server spoofing attack, a malicious party modifies the DNS server in
order to reroute a specific domain name to a different IP address.
• In such cases, the new IP address will be for a server that is actually controlled
by the attacker and contains files infected with malware.
• DNS server spoofing attacks are often used to spread computer worms and
viruses.
Anti-Spoofing
Antispoofing is a technique for identifying and dropping packets that have a false
source address.
Anti-Spoofing in Checkpoint
• There are series of actions taken by firewall when packet enters & exit from
firewall.
CASE - 1 : Spoofing attacks in Different Segment
• 192.168.1.10 is going via interface eth1. Hence, it will drop traffic coming from
Attacker’s machine.
CASE - 2 : Spoofing Attack in Same Segment
• Firewall can’t detect spoofing in same segment as reverse source route is going
to be same.
• Use spoofing detection software: There are many programs available that help
organizations detect spoofing attacks, particularly ARP Spoofing. These
programs work by inspecting and certifying data before it is transmitted and
blocking data that appears to be spoofed.
• Hosts receiving a suspicious packet can also use certain techniques to determine
whether or not the IP address is spoofed. The first (and easiest) one is to send a
request to the address of the packet and wait for the response; most of the time
the spoofed addressees do not belong to active hosts and hence no response is
sent.
• Another method is to check the Time to Live (TTL) value of the packet, and then
send a request to the spoofed host. If the reply comes, you can compare the TTL
of both packets. Most probably the TTL values will not match. But this is not a
sure shot method to detect spoofing.
—————————-X——————————
Documented By:
Rohit Gandas
rohit3120@gmail.com