Briefly describe IP spoofing attacks.

What will be an ideal response?


IP spoofing is a technique attackers use in which they send packets to the victim or target computer with a false source address. The victim is unaware that the packet is not from a trusted host, and so it accepts the packet and sends a response "back" to the indicated source computer.?Since the attacker sending the spoofed packet cannot see the response, he must guess the proper sequence numbers to send the final ACK packet as if it had come from the "real" source. If this attempt is successful, the hacker may have a connection to the victim's machine and be able to hold it for as long as the computer remains active. There are two methods for resolving these problems: sequence guessing and source routing.

Computer Science & Information Technology

You might also like to view...

___________________________________ facilities allow you to monitor all user activity on your private development machine and also to keep a record of Web server logs on a protected machine.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To prevent a report from printing blank pages, the user should remove extra space from the report

Indicate whether the statement is true or false

Computer Science & Information Technology

You can press the ____ keyboard shortcut keys to open the Insert Hyperlink dialog box.

A. CTRL+K B. CTRL+H C. SHIFT+K D. SHIFT+H

Computer Science & Information Technology

For installing Windows 8.1, you need to use a VHD with native-boot capabilities, which enables the VHD to run on a computer without a hypervisor such as Hyper-V

Indicate whether the statement is true or false

Computer Science & Information Technology