Friday, February 15, 2008

Spoofing

In the 19th century, British comedian Arthur Roberts invented a game called Spoof, which involved trickery and nonsense. This gave the English speaking world a new word that today symbolizes a gamut of hacking technologies. Spoofing attacks primarily include
· Email spoofing
· SMS spoofing
· IP spoofing
· Web spoofing.
Spoofing attacks are used to trick people into divulging confidential information (e.g. credit card data) or doing something that they would usually not do (e.g. installing malicious software on their own computers). Such use of spoofing attacks is commonly referred to as Phishing.

Email Spoofing:-
Sending an e-mail from somebody else’s e-mail ID is the simplest form of Email spoofing. Innumerable tools exist on the Internet which can easily be used to send e-mails appearing to have been sent by somebody else. The effects are intense
For example let us suppose a case.
Customers of any bank, say ABC Bank, receives an e-mail from the bank asking them to verify their usernames and passwords for bank records. The email is spoofed, but thousands of customers clicks the link and sign in with their information. Certainly their accounts will be hacked.

SMS Spoofing:-
Sending an SMS to anywhere using a particular (or concerned) person mobile number.
For instance, a young lady receives an SMS from her husband’s cell phone informing her that he had had an accident and is at the hospital and urgently need money. On receiving the SMS, she rushes out of the house with the money. She is attacked and robbed by the person who had sent her the spoofed SMS.

IP Spoofing:-
An IP address is the primary identification of a computer connected to a network (e.g. the Internet). A criminal usually uses IP spoofing to bypass IP based authentication or to mislead investigators by leaving a trail of false evidence.
IP spoofing can be accomplished using proxy servers and simple PHP scripts that are readily and freely available online.

Web spoofing:-
When you sit at a computer, open up a browser and type in www.google.com, you expect to reach the correct website (and most often you do!). This is because of the domain name system which converts human readable domain names such as www.google.com into computer readable IP addresses like 178.65.XX.YY. etc

Conclusion:-
Viewing the lots of dangerous effects that spoofing can cause for, I think:
“Spoofing should be the part of Pakistan’s cyber crime law”.

No comments: