Описание тега spoofing

In networking, the term 'spoofing' is used to describe a variety of ways in which hardware and software can be fooled. There are various kind of spoofing such as IP spoofing, MAC spoofing, E-mail address spoofing, Caller ID spoofing, GPS Spoofing etc.

In networking, the term spoofing is used to describe a variety of ways in which hardware and software can be fooled. There are various kind of spoofing such as IP spoofing, MAC spoofing, E-mail address spoofing, Caller ID spoofing, GPS Spoofing etc.

IP spoofing involves trickery that makes a message appear as if it came from an authorized IP address. In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address with the purpose of concealing the identity of the sender or impersonating another computing system.

MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device.

E-mail address spoofing is an act of forging an e-mail header to make it appear as if it came from somewhere or someone other than the actual source. This technique is commonly used by spammers to hide the origin of their e-mails and leads to problems such as misdirected bounces.

Caller ID spoofing is the practice of causing the telephone network to display a number on the recipient's Caller ID display that is not that of the actual originating station.

A GPS spoofing attack attempts to deceive a GPS receiver by broadcasting a slightly more powerful signal than that received from the GPS satellites, structured to resemble a set of normal GPS signals. These spoofed signals, however, are modified in such a way as to cause the receiver to determine its position to be somewhere other than where it actually is, specifically somewhere determined by the attacker.