From the course: Threat Modeling: Spoofing In Depth

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Spoofing a host

Spoofing a host

From the course: Threat Modeling: Spoofing In Depth

Start my 1-month free trial

Spoofing a host

- When I try to spoof a host on the internet, it could be a host that's right there next to mine, or it might be one on the other side of the planet. There are really three models of where a spoofer can sit. In order of how intuitive those are, those models are inline, local network, and blind. Inline spoofing, which you may be using today, includes NAT, network address translation, and other less intentional types of man in the middle attacks. Now, some people might argue that NAT isn't spoofing, but it is. Really, sometimes people break security for good reasons. A NAT system works like this. My computer at 10.2.3.4 sends IP packets out. But the 10 network isn't routable over the internet. So the router has two interfaces. An internal interface in 10, and an external one which my ISP has given the address 18.4.5.6. The router may impose some additional policies about inbound or outbound packets. And those can make other forms of spoofing harder. Every single system in this network…

Contents