Questions tagged [spoofing]

A kind of attack in which one system, program, or user successfully masquerades as another.

Spoofing attacks involve tricking or deceiving computer systems or other computer users. Spoofing can be carried out in several different ways. Some common attacks are:

  • IP spoofing: Creating IP packets with a forged IP address.
  • ARP spoofing: Creating ARP packets with an invalid IP-MAC pair. It is used to carry out MITM.
  • E-mail spoofing: Sending an e-mail with a spoofed IP address.

There are many other attacks that involve spoofing e.g. caller ID spoofing, DNS spoofing.

297 questions
13
votes
2 answers

Can I determine actual origin of spoofed text message?

Can I determine the actual sender of a spoofed text message? I received a text message yesterday that appeared to come from one of my contacts, but he did not send it. I contacted my carrier (Verizon) and they said that because the sender used third…
Anon
  • 131
  • 1
  • 1
  • 3
12
votes
1 answer

Did somebody try to spoof my wifi network?

I am traveling on a train in Switzerland, working on a macbook connected to a wifi hotspot that I've set up on my Phone [1] using WPA2. At some point along the journey, the internet connection drops. While I am wondering why, the OS asks me to…
leopold.talirz
  • 242
  • 1
  • 9
4
votes
1 answer

What is setuid based script root spoofing?

I'm reading this and I'm little confused. What exactly is this setuid based script root spoofing?
Tom
  • 43
  • 1
  • 3
4
votes
1 answer

How can I prove calls or messages from a spoofed number are fake?

Situation There are 3 people. Person A, B and the victim, C. Person A asks person B to spoof their phone number to look like the phone number of person C. Person A wants to report person C for harassment using this technique. Question I know that…
Ndemand
  • 41
  • 1
  • 2
3
votes
3 answers

Can iMessages be spoofed?

I am subject to legal proceedings where fake iMessages (not SMS) are being introduced by the opposing party and proclaiming to have come from me. I read about spoofing SMS messages. Is it possible for iMessages to be spoofed? If not through spoof,…
user162388
2
votes
1 answer

What is TCP spoofing?

I know about IP spoofing is it the same thing? The question originated from the question Is TCP more secure than UDP?
Ulkoma
  • 8,773
  • 17
  • 68
  • 96
2
votes
1 answer

Is it possible for someone to send a spoofed text message via iMessage to my iPhone4?

After the reports of the SMS spoofing security issue Apple released a statement claiming that the iMessage system was 'secure' and should be used to prevent text spoofing. I have received several harassing SMS spoof text messages recently and…
Nova
  • 29
  • 1
  • 2
2
votes
1 answer

Fake lock screen in full screen browser window

Suppose a desktop OS has a lock screen and fades and locks after inactivity. Suppose the default appearance and inactivity duration are well known (eg consider a default installation of some popular version of Linux). Is there something I'm missing…
stewbasic
  • 157
  • 2
  • 6
2
votes
2 answers

Why can't I force an application to close active session by spoofing the Source IP address?

I am trying to get my head around the setup above. A simple netcat session between two hosts and a pentesting machine is trying to get that established session to be terminated by only knowing source and destination IP:port combination. Shouldn't…
shterevz
  • 23
  • 2
1
vote
1 answer

Help! Someone fake texted or made a photo with my number calling and texting them

My husband received a Facebook message from a random guy who’s profile we cannot find nor could we respond! It was this picture that I attached. He’s made a picture where it looks like my phone number is calling him and texting him, when I did not.…
Chelsey
  • 11
  • 3
1
vote
1 answer

Spoofing cellular data

Is it possible to spoof cellular data? For example place a transceiver some where and communicate with a cell phone similar to wifi spoofing?
Terry
  • 1,115
  • 1
  • 9
  • 16
0
votes
2 answers

Can a spoofer intercept my email, insert text and send it on?

I send money to a charity in Africa. Recently my contact gave money to a third party, he said at my request. As proof, he forwarded back my email, and sure enough, some text had been added instructing him to give money to this pastor. Of course it…
Sally
  • 11
  • 1
  • 1
0
votes
1 answer

what if I just simply rename of a file instead of using right to left override

I'm browsing the ATT&CK and I understand the meaning of right-to-left override that it is using non-printing unicode character, but what is the different if I just simply rename a file like this: file.txt.exe in cmd, instead of inserting unicode to…
Vu Tan
  • 1
0
votes
2 answers

Can I be reasonably certain that IRS website is genuine?

https://www.irs.gov/identity-theft-fraud-scams/identity-verification I received a letter in the mail indicating that I need to verify my ID with the IRS. Can I be reasonably certain that the website is actually the IRS? Why / How?
gatorback
  • 1,541
  • 2
  • 14
  • 17
0
votes
1 answer

How to track anonomous SMS on your smartphone

I sometimes receive sms from unknown numbers asking me to send money on another unknown number. Is there a way to track the source of such numbers through logs or other technologies or solutions?
1
2