Chapter 9. Spoofing
This chapter will examine spoofing attacks, how they work, and how to defend against them.
What Is Spoofing All About?
Traditional spoofing is when attackers authenticate one machine to another by forging packets from a trusted host. In recent years, this definition has been expanded to cover any method of subverting address- or hostname-based trust or authentication.
This chapter focuses on several spoofing techniques, including
IP spoofing
ARP spoofing
DNS spoofing
TCP and IP Spoofing
Host-based network access controls are cornerstones of Internet security, although they're manifested differently in different `s. Some are designed to armor a single server, while others, like TCP wrappers, protect several services simultaneously. ...
Get Maximum Linux Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.