Spoofing: Unterschied zwischen den Versionen
Erscheinungsbild
Die Seite wurde neu angelegt: „{| class="wikitable sortable options gnu big" |- ! OSI !! Type !! Beschreibung |- | || DNS Spoofing || direct user to bogus website with DNS corruption |- | || Email Spoofing || send emails with Forged sender email address |- | || Website Spoofing || create fraudulent site to mimic legitimate one |- | || MIME Type Spoofing || disguise malicious file as benign content |- | || Content Spoofing || inject content that is not correctly escaped |- | || Ch…“ |
Keine Bearbeitungszusammenfassung |
||
| Zeile 3: | Zeile 3: | ||
! OSI !! Type !! Beschreibung | ! OSI !! Type !! Beschreibung | ||
|- | |- | ||
! | |||
| DNS Spoofing || direct user to bogus website with DNS corruption | |||
|- | |- | ||
! | |||
| Email Spoofing || send emails with Forged sender email address | |||
|- | |- | ||
! | |||
| Website Spoofing || create fraudulent site to mimic legitimate one | |||
|- | |- | ||
! | |||
| MIME Type Spoofing || disguise malicious file as benign content | |||
|- | |- | ||
! | |||
| Content Spoofing || inject content that is not correctly escaped | |||
|- | |- | ||
! | |||
| Character Encoding Spoofing || bypass input validation check | |||
|- | |- | ||
! | |||
| SSL/TLS Spoofing || intercept SSL/TLS session with fake certificate | |||
|- | |- | ||
! | |||
| Session Relay || valid session token reused to pose as original user | |||
|- | |- | ||
! | |||
| Session Fixation || force predetermined session ID to gain access | |||
|- | |- | ||
! | |||
| TCP Hijacking || inject malicious data into an existing TCP session | |||
|- | |- | ||
! | |||
| TCP Reset || send forged TCP RST packet to disrupt TCP sessions | |||
|- | |- | ||
! | |||
| UDP Reflexion || bombard target with redirected UDP responses | |||
|- | |- | ||
! | |||
| IP Spoofing || send packets from a forged source IP address | |||
|- | |- | ||
! | |||
| ICMP Redirection || intercept traffic by sending out ICMP redirect | |||
|- | |- | ||
! | |||
| Routing Spoofing || redirect traffic with bogus routing protocol msg | |||
|- | |- | ||
! | |||
| ARP Spoofing || send fake ARP response to divert victim’s traffic | |||
|- | |- | ||
! | |||
| MAC Spoofing || use fake MAC address to hide device identity | |||
|- | |- | ||
! | |||
| WiFi Spoofing || set up rogue WiFi AP to mislead user's device | |||
|- | |- | ||
! | |||
| Switch Spoofing || masquerade as a switch to bypass VLANs | |||
|} | |} | ||
Version vom 20. Juni 2025, 17:12 Uhr
| OSI | Type | Beschreibung |
|---|---|---|
| DNS Spoofing | direct user to bogus website with DNS corruption | |
| Email Spoofing | send emails with Forged sender email address | |
| Website Spoofing | create fraudulent site to mimic legitimate one | |
| MIME Type Spoofing | disguise malicious file as benign content | |
| Content Spoofing | inject content that is not correctly escaped | |
| Character Encoding Spoofing | bypass input validation check | |
| SSL/TLS Spoofing | intercept SSL/TLS session with fake certificate | |
| Session Relay | valid session token reused to pose as original user | |
| Session Fixation | force predetermined session ID to gain access | |
| TCP Hijacking | inject malicious data into an existing TCP session | |
| TCP Reset | send forged TCP RST packet to disrupt TCP sessions | |
| UDP Reflexion | bombard target with redirected UDP responses | |
| IP Spoofing | send packets from a forged source IP address | |
| ICMP Redirection | intercept traffic by sending out ICMP redirect | |
| Routing Spoofing | redirect traffic with bogus routing protocol msg | |
| ARP Spoofing | send fake ARP response to divert victim’s traffic | |
| MAC Spoofing | use fake MAC address to hide device identity | |
| WiFi Spoofing | set up rogue WiFi AP to mislead user's device | |
| Switch Spoofing | masquerade as a switch to bypass VLANs |