Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is IP Spoofing? What do hackers do with it?



What is IP Spoofing? What do hackers do with it? ..

Answer / ehtesham zafar-federal cotr

Spoofing is an act of parody specifically IP Spoofing is
falsifying a protocol that may either be false, duplicated,
and/or copied from another device that has a linked
communication from the device the IP Spoofing is beng used
towards. Linked communications may be through multiple
means of technology wither its via Wifi, Bluetooth, LAN,
etc. Within the line of communication the devices
communicating have established a secure-authenticated
relationship based on the devices IP address wither its the
server and desktop, handheld equipment and desktops, email
exchange servers and the email interface, etc. are all
types of mechanisms used within Information Technology.
With the understanding of IP authentication, a hacker can
use this to his/her benefit by simply tricking the device
the hacker wants to penetrate into by duplicating an IP
address the device will recognize. It is much more
difficult to penetrate a desktop computer vs a MFC (Multi
functional copier) unit which may also contain the
sensitive information the hacker is attempting to
accomplish. MFC units have SMTP ports enabled making it
even easier to access the network through the open ports
that may not be properly secured. Through the open port,
the hacker has found his/her way in and will now duplicate
the least secured devices on the network to IP spoof the
much harder, classified device to obtain his/her desired
information. This is just a simple example of how a hacker
may intrude. In depth, hackers use more extensive,
detailed, complicated means of ways to intrude since in
today's technology IT security has created more awareness
and uses detailed security controls from intrusions.

Is This Answer Correct ?    6 Yes 1 No

Post New Answer

More BlueTooth Interview Questions

Define cabir worm?

0 Answers  


Why can Bluetooth equipment integrate easily in TCP/IP network?

0 Answers  


What is the strength of the signal transmitted by powerful cell phones?

1 Answers  


When are packets passed from TCP layer to application layer?

0 Answers  


Can you please explain the difference between power classes in bluetooth?

0 Answers  


Is Bluetooth practical for use with mobile devices?

0 Answers  


Do you Know about OBEX Protocol?

0 Answers  


what is LDAP?

2 Answers  


What is Frequency-Hopping Spread Spectrum (FHSS)?

0 Answers  


Can you please explain the difference between bluetooth and infra red?

0 Answers  


Explain the characteristics of bluetooth?

0 Answers  


What is Service Discovery Protocol?

0 Answers  


Categories