Hping

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Lab Assessment – 4

CSE3501 - Information Security Analysis and Audit


Slot: L39+L40

KSHITIZ BHANDARI

20BCE2417
1. What is IP Spoofing? Discuss the working of IP spoofing attack.

IP spoofing is the creation of Internet Protocol (IP) packets which have a modified source address in
order to either hide the identity of the sender, to impersonate another computer system, or both. It
is a technique often used by bad actors to invoke DDoS attacks against a target device or the
surrounding infrastructure.
Working:
In IP spoofing, a hacker uses tools to modify the source address in the packet header to make the
receiving computer system think the packet is from a trusted source, such as another computer on a
legitimate network, and accept it. This occurs at the network level, so there are no external signs of
tampering.
In systems that rely on trust relationships among networked computers, IP spoofing can be used to
bypass IP address authentication. A concept sometimes referred to as the ‘castle and moat’ defense,
which is where those outside the network are considered threats, and those inside the ‘castle’ are
trusted. Once a hacker breaches the network and makes it inside, it's easy to explore the system.
Because of this vulnerability, using simple authentication as a defense strategy is increasingly being
replaced by more robust security approaches, such as those with multi-step authentication.
2. By using hping3 command send ICMP packet to Victim IP address (Victim website address
http://testphp.vulnweb.com/index.php) using random source

;
We can see that the IP address of testphp.vulnweb.com is 44.228.249.3

3. Open Wireshark to see the traffic and observe that source keeps on changing although the
destination remains same
4. By using hping3 command send ICMP packet to Victim IP address (Victim website address
http://testphp.vulnweb.com/index.php) using specific source IP address

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy