May 2020
Intermediate to advanced
262 pages
6h 48m
English
Spoofing is similar to sniffing in the way that a cyber criminal gains access to our applications from behind the internet router. In spoofing, a disguised device pretends to be a legitimate device in our application. The following diagram illustrates spoofing in a network:

Once the disguised device has established this access, it may then infect other devices with malware and also use them in DDoS attacks.