Talk With an Expert

Introduction to IP Spoofing

Introduction to IP Spoofing (PDF, 1.65MB)Published: 21 Nov, 2000
Created by
Victor Velasco

This paper describes the use of IP spoofing as a method of attacking a network in order to gain unauthorized access. The attack is based on the fact that Internet communication between distant computers is routinely handled by routers which find the best route by examining the destination address, but generally ignore the origination address. The origination address is only used by the destination machine when it responds back to the source.