{"id":30361,"date":"2024-05-02T12:55:26","date_gmt":"2024-05-02T10:55:26","guid":{"rendered":"https:\/\/inlab.fib.upc.edu\/?p=30361"},"modified":"2024-05-08T11:27:44","modified_gmt":"2024-05-08T09:27:44","slug":"what-is-spoofing","status":"publish","type":"post","link":"https:\/\/inlab.fib.upc.edu\/en\/blog\/what-is-spoofing","title":{"rendered":"What is spoofing?"},"content":{"rendered":"\n<p>In terms of security and networks, the concept of <strong><em>spoofing<\/em><\/strong> refers to the set of techniques through which an attacker impersonates a legitimate entity by falsifying data in a communication.<\/p>\n\n<p>There are several types of <em>spoofing<\/em>, but the most important are the following:<\/p>\n\n<h2 class=\"wp-block-heading has-text-color has-link-color wp-elements-435578b56af610b59c1ac77e5437995e\" style=\"color:#007cb5\">IP spoofing<\/h2>\n\n<p>Before going into what this type of <em>spoofing<\/em> consists of, it is necessary to know what an <strong>IP packet <\/strong> is. In networking, a packet is a small segment of a larger message. Data sent over a network is divided into packets, and these are combined by the final recipient to reconstruct the complete message. Thus, an IP packet is an IP (Internet Protocol) packet.<\/p>\n\n<p>These types of packets have two very distinct parts: the IP header and the data. In the following image, we can see the format of the IP header and its fields.<\/p>\n\n<figure class=\"wp-block-image aligncenter size-full is-resized is-style-default\"><img fetchpriority=\"high\" decoding=\"async\" width=\"978\" height=\"410\" src=\"https:\/\/inlab.fib.upc.edu\/wp-content\/uploads\/2024\/04\/spof1.png\" alt=\"\" class=\"wp-image-30268\" style=\"width:630px;height:auto\" srcset=\"https:\/\/inlab.fib.upc.edu\/wp-content\/uploads\/2024\/04\/spof1.png 978w, https:\/\/inlab.fib.upc.edu\/wp-content\/uploads\/2024\/04\/spof1-300x126.png 300w, https:\/\/inlab.fib.upc.edu\/wp-content\/uploads\/2024\/04\/spof1-768x322.png 768w\" sizes=\"(max-width: 978px) 100vw, 978px\" \/><\/figure>\n\n<p>The two most important fields are the <strong>source<\/strong> and <strong>destination<\/strong> <strong> address<\/strong>, which specify who has sent the packet and therefore to which address it should be replied (if applicable) and the final recipient of that packet.<\/p>\n\n<p>IP spoofing, essentially consists of substituting the source IP address of an IP packet. In this way, the attacker can send frames impersonating someone else. For this reason, any protocol encapsulated over IP is susceptible to this type of <em>spoofing<\/em>.<\/p>\n\n<p>Carrying out this type of attack is very easy and quick to perform, since, as we have seen, it is simply a matter of modifying a field in the header. However, it should be noted that the recipient will respond to the supposed sender address of the packets (the spoofed address) and not to the attacker. For this reason, this type of <em>spoofing<\/em>, together with <strong><em>broadcast requests<\/em><\/strong>, is used to commit <strong><em>flooding attacks<\/em><\/strong>, without the need to obtain any response.<\/p>\n\n<h2 class=\"wp-block-heading has-text-color has-link-color wp-elements-4ef61277cfd612be023e64d4844b4fff\" style=\"color:#007cb5\">ARP spoofing<\/h2>\n\n<p><strong>ARP<\/strong> (<em>Address Resolution Protocol<\/em>) is a protocol responsible for finding a physical address (Ethernet MAC) that corresponds to the IP address to which the user wants to send data. For this reason, each device has an ARP table with IP-MAC associations. <\/p>\n\n<p>In other words, we assume that Bob has a letter for Alice, but doesn&#8217;t know which mailbox to drop it in. That is, Bob knows to whom he has to send the letter (@IP), but not in which physical mailbox to drop it (@MAC). In this case, Bob will consult his ARP table and find the entry:<\/p>\n\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" width=\"852\" height=\"153\" src=\"https:\/\/inlab.fib.upc.edu\/wp-content\/uploads\/2024\/04\/spof2.png\" alt=\"\" class=\"wp-image-30271\" srcset=\"https:\/\/inlab.fib.upc.edu\/wp-content\/uploads\/2024\/04\/spof2.png 852w, https:\/\/inlab.fib.upc.edu\/wp-content\/uploads\/2024\/04\/spof2-300x54.png 300w, https:\/\/inlab.fib.upc.edu\/wp-content\/uploads\/2024\/04\/spof2-768x138.png 768w\" sizes=\"(max-width: 852px) 100vw, 852px\" \/><\/figure>\n\n<p>Now Bob knows which mailbox (@MAC) to deliver the letter to.<\/p>\n\n<p>ARP table spoofing involves the construction of modified ARP request and response frames to alter the ARP table (i.e., the IP-MAC relationship) of a victim and force it to send IP packets to the attacker. <\/p>\n\n<p>Going back to the previous analogy, an attacker can make Bob believe that he is leaving the letters in Alice&#8217;s mailbox, when he is really leaving them in the attacker&#8217;s mailbox.<\/p>\n\n<h2 class=\"wp-block-heading has-text-color has-link-color wp-elements-6cb41dd1bd1492981447c7fd11cff645\" style=\"color:#007cb5\">DNS spoofing<\/h2>\n\n<p>This type of <em>spoofing<\/em> consists of falsifying the relationship between the domain name and an IP in the DNS name resolution query. This is achieved by manipulating the entries of a DNS server. For example, let&#8217;s assume the following case:<\/p>\n\n<p class=\"has-background\" style=\"background-color:#f4f4f4\">The <strong><em>legit.com<\/em><\/strong> domain resolves to the <strong>@<em>IP-Victim<\/em><\/strong> address. <br\/><br\/>An attacker manages to spoof DNS server entries in such a way that it responds to resolutions from this domain to another IP (e.g. @<em>IP-Attacker<\/em>).<br\/><br\/>Now, requests to <strong><em>legit.com<\/em><\/strong> will be resolved to <strong>@<em>IP-Attacker<\/em><\/strong>.<\/p>\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" width=\"729\" height=\"587\" src=\"https:\/\/inlab.fib.upc.edu\/wp-content\/uploads\/2024\/04\/spof3.png\" alt=\"\" class=\"wp-image-30274\" style=\"width:570px;height:auto\" srcset=\"https:\/\/inlab.fib.upc.edu\/wp-content\/uploads\/2024\/04\/spof3.png 729w, https:\/\/inlab.fib.upc.edu\/wp-content\/uploads\/2024\/04\/spof3-300x242.png 300w\" sizes=\"(max-width: 729px) 100vw, 729px\" \/><\/figure>\n\n<p>It is worth mentioning that carrying out this type of <em>spoofing<\/em> as well as the previous one is only possible if the attacker is within the same network as the victim devices. The effectiveness of this type of attack is greatly reduced when we are in secure networks and use HTTPS connections (encrypted communication). Hence the importance of connecting to secure networks.<\/p>\n\n<h2 class=\"wp-block-heading has-text-color has-link-color wp-elements-d95341a3fec40a346616fa4c4d3a5ec6\" style=\"color:#007cb5\">E-mail spoofing<\/h2>\n\n<p><em>Email <\/em> <em>spoofing<\/em> is the creation of email messages with a false sender address. This type of <em>spoofing<\/em> is easy to perform since the basic email service protocols do not have any authentication method. This is due to the fact that at the time of its creation, security was not an issue or a relevant aspect.<\/p>\n\n<p><strong><em>Spam<\/em><\/strong> and <strong><em>phishing<\/em><\/strong> emails use this type of spoofing to deceive the victim about the legitimacy of the sender. The recommended measures to prevent these attacks are to create <strong><em>SPF<\/em><\/strong> DNS records and <strong><em>DKIM<\/em><\/strong> digital signatures.<\/p>\n\n<p>It is important not to confuse the term <strong><em>spoofing<\/em><\/strong> with <strong><em>phishing<\/em><\/strong>. <strong><em>Phishing<\/em><\/strong> refers to a set of techniques aimed at deceiving the victim, gaining their trust in order to manipulate them or make them perform involuntary actions.<\/p>\n\n<p><em>Phishing<\/em> is the <strong>WHAT<\/strong> and <em>spoofing <\/em> is part of the <strong>HOW<\/strong>.<\/p>\n\n<h2 class=\"wp-block-heading has-text-color has-link-color wp-elements-bad36f90e2e0e90c32d80fc77897ad1a\" style=\"color:#007cb5\">Conclusions<\/h2>\n\n<p>To conclude, there is currently a general unawareness and lack of knowledge on the part of organizations about <strong><em>spoofing<\/em><\/strong> and its countermeasures. In addition, it is not uncommon to find, despite using the preventions, a misconfiguration of these, which results, in many cases, to remain vulnerable to <em>phishing <\/em> attacks.<\/p>\n\n<p>It should be emphasized that, as is often said, the most vulnerable asset is people. Good awareness and training for these types of attacks, which take advantage of people&#8217;s trust and lack of knowledge, are the key to stopping these threats. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>In terms of security and networks, the concept of spoofing refers to the set of techniques through which an attacker impersonates a legitimate entity by falsifying data in a communication. There are several types of spoofing, but the most important are the following: IP spoofing Before going into what this type of spoofing consists of, [&hellip;]<\/p>\n","protected":false},"author":1242,"featured_media":30286,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[572],"tags":[],"experteses":[],"class_list":["post-30361","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"_links":{"self":[{"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/posts\/30361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/users\/1242"}],"replies":[{"embeddable":true,"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/comments?post=30361"}],"version-history":[{"count":5,"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/posts\/30361\/revisions"}],"predecessor-version":[{"id":30508,"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/posts\/30361\/revisions\/30508"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/media\/30286"}],"wp:attachment":[{"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/media?parent=30361"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/categories?post=30361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/tags?post=30361"},{"taxonomy":"experteses","embeddable":true,"href":"https:\/\/inlab.fib.upc.edu\/en\/wp-json\/wp\/v2\/experteses?post=30361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}