From the course: IT Security Foundations: Network Security
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Spoofing protocols
From the course: IT Security Foundations: Network Security
Spoofing protocols
- Protocol spoofing is when a malicious actor impersonates another entity on the network. This is done with the objective of stealing data, spreading malware or circumventing access controls. An attacker has several tools in his or her arsenal. Common methods include spoofing DNS entries, IP addresses, email or address resolution protocol. Let's talk about a few examples of protocol spoofing. Domain name system is a host name to IP address resolution. It's essential to any network. A spoof will modify the DNS server cache. Now, on your own system, you have a DNS cache, so you can access websites quickly. To see your own cache go into the command prompt on a Windows operating system, and there I will type IP config display DNS, and press Enter. Now there is where you can see your own local cache. Now, if we were to modify the server cache or any cache for that matter, it would direct us to websites we probably wouldn't want to visit. An IP address uniquely identifies a host on a…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.