From the course: IT Security Foundations: Network Security

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Spoofing protocols

Spoofing protocols

- Protocol spoofing is when a malicious actor impersonates another entity on the network. This is done with the objective of stealing data, spreading malware or circumventing access controls. An attacker has several tools in his or her arsenal. Common methods include spoofing DNS entries, IP addresses, email or address resolution protocol. Let's talk about a few examples of protocol spoofing. Domain name system is a host name to IP address resolution. It's essential to any network. A spoof will modify the DNS server cache. Now, on your own system, you have a DNS cache, so you can access websites quickly. To see your own cache go into the command prompt on a Windows operating system, and there I will type IP config display DNS, and press Enter. Now there is where you can see your own local cache. Now, if we were to modify the server cache or any cache for that matter, it would direct us to websites we probably wouldn't want to visit. An IP address uniquely identifies a host on a…

Contents