Chapter 7. Spoofing Attacks
IN THIS CHAPTER
In this chapter you’ll learn about spoofing attacks—how they are performed, and how you can prevent them.
What Is Spoofing?
The secret to creativity is knowing how to hide your sources. | ||
--Albert Einstein |
Spoofing can be summed up in a single sentence: It’s a sophisticated technique of authenticating one machine to another by forging packets from a trusted source address.
From that definition, you can safely conclude that spoofing is a complicated process. However, by this chapter’s end, you’ll have a clear ...
Get Maximum Security, Fourth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.