Zum Inhalt springen

Spoofing: Unterschied zwischen den Versionen

Aus Foxwiki
Die Seite wurde neu angelegt: „{| class="wikitable sortable options gnu big" |- ! OSI !! Type !! Beschreibung |- | || DNS Spoofing || direct user to bogus website with DNS corruption |- | || Email Spoofing || send emails with Forged sender email address |- | || Website Spoofing || create fraudulent site to mimic legitimate one |- | || MIME Type Spoofing || disguise malicious file as benign content |- | || Content Spoofing || inject content that is not correctly escaped |- | || Ch…“
 
Keine Bearbeitungszusammenfassung
Zeile 3: Zeile 3:
! OSI !! Type !! Beschreibung
! OSI !! Type !! Beschreibung
|-
|-
| ||  DNS Spoofing || direct user to bogus website with DNS corruption
!
|  DNS Spoofing || direct user to bogus website with DNS corruption
|-
|-
| ||  Email Spoofing || send emails with Forged sender email address
!
|  Email Spoofing || send emails with Forged sender email address
|-
|-
| ||  Website Spoofing || create fraudulent site to mimic legitimate one
!
|  Website Spoofing || create fraudulent site to mimic legitimate one
|-
|-
| ||  MIME Type Spoofing || disguise malicious file as benign content
!
|  MIME Type Spoofing || disguise malicious file as benign content
|-
|-
| ||  Content Spoofing || inject content that is not correctly escaped
!
|  Content Spoofing || inject content that is not correctly escaped
|-
|-
| ||  Character Encoding Spoofing || bypass input validation check
!
|  Character Encoding Spoofing || bypass input validation check
|-
|-
| ||  SSL/TLS Spoofing || intercept SSL/TLS session with fake certificate
!
|  SSL/TLS Spoofing || intercept SSL/TLS session with fake certificate
|-
|-
| ||  Session Relay || valid session token reused to pose as original user
!
|  Session Relay || valid session token reused to pose as original user
|-
|-
| ||  Session Fixation || force predetermined session ID to gain access
!
|  Session Fixation || force predetermined session ID to gain access
|-
|-
| ||  TCP Hijacking || inject malicious data into an existing TCP session
!
|  TCP Hijacking || inject malicious data into an existing TCP session
|-
|-
| ||  TCP Reset || send forged TCP RST packet to disrupt TCP sessions
!
|  TCP Reset || send forged TCP RST packet to disrupt TCP sessions
|-
|-
| ||  UDP Reflexion || bombard target with redirected UDP responses
!
|  UDP Reflexion || bombard target with redirected UDP responses
|-
|-
| ||  IP Spoofing || send packets from a forged source IP address
!
|  IP Spoofing || send packets from a forged source IP address
|-
|-
| ||  ICMP Redirection || intercept traffic by sending out ICMP redirect
!
|  ICMP Redirection || intercept traffic by sending out ICMP redirect
|-
|-
| ||  Routing Spoofing || redirect traffic with bogus routing protocol msg
!
|  Routing Spoofing || redirect traffic with bogus routing protocol msg
|-
|-
| ||  ARP Spoofing || send fake ARP response to divert victim’s traffic
!
|  ARP Spoofing || send fake ARP response to divert victim’s traffic
|-
|-
| ||  MAC Spoofing || use fake MAC address to hide device identity
!
|  MAC Spoofing || use fake MAC address to hide device identity
|-
|-
| ||  WiFi Spoofing || set up rogue WiFi AP to mislead user's device
!
|  WiFi Spoofing || set up rogue WiFi AP to mislead user's device
|-
|-
| ||  Switch Spoofing || masquerade as a switch to bypass VLANs
!
|  Switch Spoofing || masquerade as a switch to bypass VLANs
|}
|}

Version vom 20. Juni 2025, 18:12 Uhr

OSI Type Beschreibung
DNS Spoofing direct user to bogus website with DNS corruption
Email Spoofing send emails with Forged sender email address
Website Spoofing create fraudulent site to mimic legitimate one
MIME Type Spoofing disguise malicious file as benign content
Content Spoofing inject content that is not correctly escaped
Character Encoding Spoofing bypass input validation check
SSL/TLS Spoofing intercept SSL/TLS session with fake certificate
Session Relay valid session token reused to pose as original user
Session Fixation force predetermined session ID to gain access
TCP Hijacking inject malicious data into an existing TCP session
TCP Reset send forged TCP RST packet to disrupt TCP sessions
UDP Reflexion bombard target with redirected UDP responses
IP Spoofing send packets from a forged source IP address
ICMP Redirection intercept traffic by sending out ICMP redirect
Routing Spoofing redirect traffic with bogus routing protocol msg
ARP Spoofing send fake ARP response to divert victim’s traffic
MAC Spoofing use fake MAC address to hide device identity
WiFi Spoofing set up rogue WiFi AP to mislead user's device
Switch Spoofing masquerade as a switch to bypass VLANs