What is IP Spoofing? What do hackers do with it?

Showing Answers 1 - 6 of 6 Answers

Shaila

  • Feb 22nd, 2006
 

Ip spoofing is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. To engage in IP spoofing, a hacker must first use a variety of techniques to find an IP address of a trusted host and then modify the packet headers so that it appears that the packets are coming from that host.

  Was this answer useful?  Yes

sreenivas

  • Mar 26th, 2006
 

Hi shaila............

   Ur answer is absolutly correct regarding spoofing

    Recently i have faced one tough question in interview......... i hope u can clear

    Plz tell me the difference between flooding and broadcast?

  Was this answer useful?  Yes

jonnaprabhu

  • May 10th, 2006
 

Regarding broadcast, the packet is sent to all the hosts on the network once.

Whereas in flooding, the packets are sent multiple times.

As an example if we use a sendto() call to the intended IP's on the network we have only once, we could say it is a broadcast.

Whereas if we use the same call iteratively then it is flooding

  Was this answer useful?  Yes

Arnika Tripathi

  • Jan 2nd, 2014
 

Flooding and Broadcast are two routing algorithms used in computer networks today. Flooding sends all incoming packets through every outgoing edge. Broadcasting means every device in the network will receive a packet.

  Was this answer useful?  Yes

Give your answer:

If you think the above answer is not correct, Please select a reason and add your answer below.

 

Related Answered Questions

 

Related Open Questions