IP spoofing attack

gokibria
gokibria  Diamond  (1)
7 years 10 months ago  View: 1044  Reply: 3
1F
To get an access right, an intruder generates a packet carrying a bogus source address which can make an unauthorized client access the system applying the IP authentication even in the root authority. In this way, the system can also be destroyed even though the response packet does not reach the system. This is the IP Spoofing attack.
mkmohiuddin
mkmohiuddin  Senior 
7 years 10 months ago
2F
very effective post.
mershad
mershad  Gold 
7 years 10 months ago
3F
Please share how can we configure to protect this attack
Armetta
Armetta  Diamond 
7 years 10 months ago
4F
good description