From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Performing spoofing attacks

Performing spoofing attacks

- With respect to spoofing, we need to make a distinction between local spoofing and internet-based spoofing. Local spoofing, easy to do and can achieve valid results. Spoofing across the internet is easy to do, but getting a response is next to impossible. So let's talk about that in depth. With respect to MAC spoofing, this is changing your MAC address in order to impersonate another host. Now, in order for this to work, you do need to poison that CAM table, and this is wired example. We'll talk about wifi here in just a minute. So manipulation of my source MAC address in order to impersonate another host. In order for this to occur, I do need to send some sort of frame towards the switch so that the switch knows that host 01 exists out the port towards the attacker. Every time host 01 talks, it's going to reprogram that CAM table. That means you need to essentially flood towards the switch with some sort of frame that says Host 01 exists out the port towards the attacker. Now, on…

Contents