O'Reilly logo

Maximum Linux Security by Anonymous

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Spoofing

This chapter will examine spoofing attacks, how they work, and how to defend against them.

What Is Spoofing All About?

Traditional spoofing is when attackers authenticate one machine to another by forging packets from a trusted host. In recent years, this definition has been expanded to cover any method of subverting address- or hostname-based trust or authentication.

This chapter focuses on several spoofing techniques, including

  • IP spoofing

  • ARP spoofing

  • DNS spoofing

TCP and IP Spoofing

Host-based network access controls are cornerstones of Internet security, although they're manifested differently in different `s. Some are designed to armor a single server, while others, like TCP wrappers, protect several services simultaneously. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required