To deceive for the purpose of gaining access to someone else's resources (for example, to fake an Internet address so that one looks like a certain kind of Internet user)
1. (n.) A message or action with the intention of distracting or misleading who it's directed to, often times designed to also hide the identity of the one doing it. 2. (v.) The act of using such a message or action.
This is a generic term for misleading a computer system into believing that you are not who you say you are. Most commonly, it refers to a TCP/IP trick that allows you to get around network security by impersonating a TCP/IP address inside of the network.
To gain unauthorized access to a computer by sending a message to it with an IP address indicating that the message is coming from a trusted host. To engage in IP spoofing, a hacker must first use a variety of techniques to find an IP address of a trusted host and then modify the packet headers so that it appears that the packets are coming from that host.
To capture, alter, and retransmit a communication stream in a way that misleads the recipient.
Spoofs are misleading Web addresses, spam e-mails, and IP addresses forged by a malicious hacker to look identical to the legitimate organization's materials. They are used to trick users into responding to alerts that appear to be issued by trusted organizations such as banks. Users who respond to the visual fakery and urgency of the requests are prompted to give up private data, which is then often used in identity theft. Spoofs are instrumental in carrying out phishing, pharming, and phreaking scams. In a pharming exploit, a spoofed IP address of a legitimate company might be scripted to float over the culprit's actual, nonlegitimate IP address in order to make the user believe the site is valid.
Spoof refers to fake of forged information or communications. For example, spoofed IPs or packets consist of network packets that are generated by one host but are forged with the IP address of another host.
Phishing scams often spoof, or create hoax copies of, company web sites and e-mails. 2.To spoof means to fool computer systems into believing you are someone other than who you really are. Typically this refers to a trick that fools network security into believing a computer has an IP address inside of the network, thus granting it clearance to network resources.