Zum Inhalt springen

Diskussion:Spoofing

Aus Foxwiki
Version vom 11. Juli 2025, 10:56 Uhr von Dirkwagner (Diskussion | Beiträge) (Die Seite wurde neu angelegt: „{| class="wikitable gnu big" |- ! OSI !! Type !! Beschreibung |- ! rowspan="3" | 7 | DNS Spoofing || direct user to bogus website with DNS corruption |- | Email Spoofing || send emails with Forged sender email address |- | Website Spoofing || create fraudulent site to mimic legitimate one |- ! rowspan="3" | 6 | MIME Type Spoofing || disguise malicious file as benign content |- | Content Spoofing || inject content that is not correctly escaped |- | C…“)
(Unterschied) ← Nächstältere Version | Aktuelle Version (Unterschied) | Nächstjüngere Version → (Unterschied)
OSI Type Beschreibung
7 DNS Spoofing direct user to bogus website with DNS corruption
Email Spoofing send emails with Forged sender email address
Website Spoofing create fraudulent site to mimic legitimate one
6 MIME Type Spoofing disguise malicious file as benign content
Content Spoofing inject content that is not correctly escaped
Character Encoding Spoofing bypass input validation check
5 SSL/TLS Spoofing intercept SSL/TLS session with fake certificate
Session Relay valid session token reused to pose as original user
Session Fixation force predetermined session ID to gain access
4 TCP Hijacking inject malicious data into an existing TCP session
TCP Reset send forged TCP RST packet to disrupt TCP sessions
UDP Reflexion bombard target with redirected UDP responses
3 IP Spoofing send packets from a forged source IP address
ICMP Redirection intercept traffic by sending out ICMP redirect
Routing Spoofing redirect traffic with bogus routing protocol msg
2 ARP Spoofing send fake ARP response to divert victim’s traffic
MAC Spoofing use fake MAC address to hide device identity
WiFi Spoofing set up rogue WiFi AP to mislead user's device
Switch Spoofing masquerade as a switch to bypass VLANs