Diskussion:Spoofing
Erscheinungsbild
| OSI | Type | Beschreibung |
|---|---|---|
| 7 | DNS Spoofing | direct user to bogus website with DNS corruption |
| Email Spoofing | send emails with Forged sender email address | |
| Website Spoofing | create fraudulent site to mimic legitimate one | |
| 6 | MIME Type Spoofing | disguise malicious file as benign content |
| Content Spoofing | inject content that is not correctly escaped | |
| Character Encoding Spoofing | bypass input validation check | |
| 5 | SSL/TLS Spoofing | intercept SSL/TLS session with fake certificate |
| Session Relay | valid session token reused to pose as original user | |
| Session Fixation | force predetermined session ID to gain access | |
| 4 | TCP Hijacking | inject malicious data into an existing TCP session |
| TCP Reset | send forged TCP RST packet to disrupt TCP sessions | |
| UDP Reflexion | bombard target with redirected UDP responses | |
| 3 | IP Spoofing | send packets from a forged source IP address |
| ICMP Redirection | intercept traffic by sending out ICMP redirect | |
| Routing Spoofing | redirect traffic with bogus routing protocol msg | |
| 2 | ARP Spoofing | send fake ARP response to divert victim’s traffic |
| MAC Spoofing | use fake MAC address to hide device identity | |
| WiFi Spoofing | set up rogue WiFi AP to mislead user's device | |
| Switch Spoofing | masquerade as a switch to bypass VLANs |