Questions tagged [spoofing]
In networking, the term 'spoofing' is used to describe a variety of ways in which hardware and software can be fooled. There are various kind of spoofing such as IP spoofing, MAC spoofing, E-mail address spoofing, Caller ID spoofing, GPS Spoofing etc.
spoofing
329
questions
-1
votes
0
answers
31
views
Modifying UDP payload on the fly with scapy
My network has 2 interfaces
eth1 ethernet 192.168.1.1
eth2 wifi 10.42.0.1
Linux Ubuntu
I'm getting ~20 udp packets to the port 10000 each 1 sec with the eth1 interface and it sends to my wifi hotspot ...
0
votes
0
answers
238
views
Verify that user agent facebookexternalhit is really Facebook
I'm seeing a lot of hits on my website with the following user agent:
facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)
I'm trying to verify whether it really is from Facebook ...
0
votes
0
answers
35
views
ARP spoofing makes my Target Machine lose internet
This is my code, I have tried flushing ip tables and enabled port forwarding. I don't know what is wrong with this script, I have also turned firewall off from my windows VM(target machine). Don't ...
0
votes
1
answer
28
views
Is it possible to send a sms text to someones iphone and make it appear that they replied to a number that they did not reply to?
I received a text from a number on my iphone that I do not recognize and the strange thing is is that there is no conversation thread. The only text showing looks like it came from my phone replying ...
0
votes
0
answers
30
views
I want to send packet with Scapy and it send packet normally, but they come back without an answer
This part of the code should find the MAC address of the target using its IP address.
def get_MAC(ip):
pkt_Ether = scapy.Ether(dst='ff:ff:ff:ff:ff')
pkt_ARP = scapy.ARP(pdst=ip)
packet = ...
1
vote
1
answer
87
views
What's the point of SPF if an attacker spoofs the "From" address?
Based on my current understanding, SPF is only concerned about validating that the sending email server IP is listed in the SPF records for the domain of the "envelope from" (Return-Path/...
0
votes
0
answers
19
views
risks using dynamic-dns for selfhosted webservice
I'm running a small self-hosted webserver using Apache and just PHP, HTML and CSS to
supply some PDF-documents to my customers. One of them now noted there could be "certain" risks using ...
0
votes
0
answers
94
views
Exact same request gives different response on Linux compared to Windows
I am trying to execute the following the request (which returns a 200 OK response on Windows) under WSL (and also on a seperate remote Linux server where the same thing happens):
curl https://www.ah....
1
vote
0
answers
51
views
Increase security in SQL Server with known login that cannot be changed or dropped?
I have a server type software connected to my local SQL Server and it has a hardcoded SQL login/password(also requires sqladmin role) inside that I CAN NOT change. As I have to use this software, I ...
1
vote
2
answers
97
views
How does server verify geolocation data received from client?
How do location-based apps securely verify client locations on the server-side?
Location data is vulnerable to manipulation, with users using VPNs or analyzing network history to send spoof API ...
0
votes
0
answers
41
views
AEM issue while spoof login
Spoof login redirecting to Unexpected Error (reutest.net) this page
image
have tried following things also
As soon as the instance is started, please open the "crx-quickstart" folder and go ...
0
votes
0
answers
23
views
VM mac adress is identical as the host device
I'm using Oracle VM Kali Linux.
I tried arp spoofing on home network, but other devices other than host receives router's mac as the host pcs mac adress instead of the VM machine's although on ...
-1
votes
1
answer
29
views
Unauthorized domain name spoofing
I have a domain (let it be sample.test). I connected it to the Cloudflare platform. One day I decided to check Google Search Console and I found out there was another (completely unrelated to me) ...
1
vote
1
answer
527
views
Need help in simulating (and blocking) HTTP_HOST spoofing attacks
I have an nginx reverse proxy serving multiple small web services. Each of the servers has different domain names, and are individually protected with SSL using Certbot. The installation for these was ...
0
votes
1
answer
581
views
How to spoof 'to' and 'from' fields from actual email recipient and sender addresses
For my use case, I would like to manually set the displayed email addresses in the "to" and "from" field headers of the email, separate from the actual email recipient and sender. ...