Spoofing: Unterschied zwischen den Versionen
Erscheinungsbild
Keine Bearbeitungszusammenfassung |
Keine Bearbeitungszusammenfassung |
||
Zeile 3: | Zeile 3: | ||
! OSI !! Type !! Beschreibung | ! OSI !! Type !! Beschreibung | ||
|- | |- | ||
! | ! rowspan="3" | 7 | ||
| DNS Spoofing || direct user to bogus website with DNS corruption | | DNS Spoofing || direct user to bogus website with DNS corruption | ||
|- | |- | ||
| Email Spoofing || send emails with Forged sender email address | | Email Spoofing || send emails with Forged sender email address | ||
|- | |- | ||
| Website Spoofing || create fraudulent site to mimic legitimate one | | Website Spoofing || create fraudulent site to mimic legitimate one | ||
|- | |- | ||
! | ! rowspan="3" | 6 | ||
| MIME Type Spoofing || disguise malicious file as benign content | | MIME Type Spoofing || disguise malicious file as benign content | ||
|- | |- | ||
| Content Spoofing || inject content that is not correctly escaped | | Content Spoofing || inject content that is not correctly escaped | ||
|- | |- | ||
| Character Encoding Spoofing || bypass input validation check | | Character Encoding Spoofing || bypass input validation check | ||
|- | |- | ||
! | ! rowspan="3" | 5 | ||
| SSL/TLS Spoofing || intercept SSL/TLS session with fake certificate | | SSL/TLS Spoofing || intercept SSL/TLS session with fake certificate | ||
|- | |- | ||
| Session Relay || valid session token reused to pose as original user | | Session Relay || valid session token reused to pose as original user | ||
|- | |- | ||
| Session Fixation || force predetermined session ID to gain access | | Session Fixation || force predetermined session ID to gain access | ||
|- | |- | ||
! | ! rowspan="3" | 4 | ||
| TCP Hijacking || inject malicious data into an existing TCP session | | TCP Hijacking || inject malicious data into an existing TCP session | ||
|- | |- | ||
| TCP Reset || send forged TCP RST packet to disrupt TCP sessions | | TCP Reset || send forged TCP RST packet to disrupt TCP sessions | ||
|- | |- | ||
| UDP Reflexion || bombard target with redirected UDP responses | | UDP Reflexion || bombard target with redirected UDP responses | ||
|- | |- | ||
! | ! rowspan="3" | 3 | ||
| IP Spoofing || send packets from a forged source IP address | | IP Spoofing || send packets from a forged source IP address | ||
|- | |- | ||
| ICMP Redirection || intercept traffic by sending out ICMP redirect | | ICMP Redirection || intercept traffic by sending out ICMP redirect | ||
|- | |- | ||
| Routing Spoofing || redirect traffic with bogus routing protocol msg | | Routing Spoofing || redirect traffic with bogus routing protocol msg | ||
|- | |- | ||
! | ! rowspan="4" | 2 | ||
| ARP Spoofing || send fake ARP response to divert victim’s traffic | | ARP Spoofing || send fake ARP response to divert victim’s traffic | ||
|- | |- | ||
| MAC Spoofing || use fake MAC address to hide device identity | | MAC Spoofing || use fake MAC address to hide device identity | ||
|- | |- | ||
| WiFi Spoofing || set up rogue WiFi AP to mislead user's device | | WiFi Spoofing || set up rogue WiFi AP to mislead user's device | ||
|- | |- | ||
| Switch Spoofing || masquerade as a switch to bypass VLANs | | Switch Spoofing || masquerade as a switch to bypass VLANs | ||
|} | |} |
Version vom 20. Juni 2025, 18:15 Uhr
OSI | Type | Beschreibung |
---|---|---|
7 | DNS Spoofing | direct user to bogus website with DNS corruption |
Email Spoofing | send emails with Forged sender email address | |
Website Spoofing | create fraudulent site to mimic legitimate one | |
6 | MIME Type Spoofing | disguise malicious file as benign content |
Content Spoofing | inject content that is not correctly escaped | |
Character Encoding Spoofing | bypass input validation check | |
5 | SSL/TLS Spoofing | intercept SSL/TLS session with fake certificate |
Session Relay | valid session token reused to pose as original user | |
Session Fixation | force predetermined session ID to gain access | |
4 | TCP Hijacking | inject malicious data into an existing TCP session |
TCP Reset | send forged TCP RST packet to disrupt TCP sessions | |
UDP Reflexion | bombard target with redirected UDP responses | |
3 | IP Spoofing | send packets from a forged source IP address |
ICMP Redirection | intercept traffic by sending out ICMP redirect | |
Routing Spoofing | redirect traffic with bogus routing protocol msg | |
2 | ARP Spoofing | send fake ARP response to divert victim’s traffic |
MAC Spoofing | use fake MAC address to hide device identity | |
WiFi Spoofing | set up rogue WiFi AP to mislead user's device | |
Switch Spoofing | masquerade as a switch to bypass VLANs |