Skip to content

Spoofing Attack

Understanding the Mechanics of Spoofing Attacks: IP Address, DNS, and ARP Spoofing

Mitigate Spoofing Attacks Today
Table of Contents

WHAT IS SPOOFING ATTACK?

In a spoofing attack, a malicious party or program impersonates another device or user on a network in order to launch attacks against network hosts, steal data, spread malware, or bypass access controls. Spoofing is often the way a bad actor gains access in order to execute a larger cyberattack such as an advanced persistent threat or a man-in-the-middle attack.

  • IP address spoofing (or IP spoofing): The creation of IP packets with a false source IP address for the purpose of impersonating another computer system and gaining unauthorized access to machines.
  • DNS spoofing (aka DNS cache poisoning): A form of computer security hacking in which corrupt Domain Name System data is introduced into the DNS resolver's cache, causing the name server to return an incorrect result record, e.g. an IP address.
  • ARP spoofing: Spoofed Address Resolution Protocol (ARP) addresses are sent onto a LAN in order to associate the attacker's MAC address with the IP address of another host, causing any traffic meant for that IP address to be sent to the attacker instead.

 

Learn More About Contrast Security

Contrast is the clear customers’ choice

Contrast is named a Customers’ Choice in the 2021 Gartner Peer Insights “Voice of the Customer”: Application Security Testing report. With the highest percentage of 5-star ratings, this is the third consecutive year Contrast has received this powerful endorsement from customers.

gartner-peer-insight-2021

Built for Developers. Trusted by Security.

Infosys
ring-central-logo-1
bmw-logo-rgb
backbase-logo-2
intuit-logo
credit-suisse

Learn Secure Code

Cross Site Scripting (XSS)

CROSS SITE SCRIPTING (XSS)

Learn about Cross site scripting (XSS) and how it affects your Java source code

SQL Injection - Java-1

SQL INJECTION

Learn about SWL injection and how it affects your Java source code

Client Side Injection

CLIENT SIDE INJECTION

Learn about client-side injection and how it can affect your source code