What is (E-Mail or IP)Spoofing?
Spoofing :
The most Common Type of Spoofing that You are Likely to encourage is IP Or E-Mail Spoofing.
Primarily used to Spoof The Source Address of the E-Mail or IP of the Device.
In this Case E-Mail is look Just Like E-Mail come from the Trusted Server or Website.But its come from the Wrong Or Harmful sites Which Directly or Indirectly Affect the Customer In Various Ways.
It's Common In Now Days People Submitted Their Emails at many untrusted websites and We Don't know where they use our information.
E-Mail Marketing is also a very Big-market your E-mails also used for that purpose to send you some deals by them and many other uses.
fig:- Example Of Spoofing
E-Mail Spoofing used to :-
(1) .Delivery a phishing message (One that cons the user into divulging confidential information) Replying to the E-mail won't work properly,but clicking on links in the E-mail will take the user to a spoofed Web site.
(2).Delivery a Malware payload,such as a Virus,Worms,or Trojan Horse. The Malware may come as an attachment that must be Downloaded or may be coded into the E-Mail So that all the user need to do is open the E-Mail.
One Of the most annoying Spoofing Trick is to use the content of E-Mail Address book on a Compromised Machine as the source of Spoofing.
A Spoofed E-Mail is Easy to detect by examining the E-Mail header information and is something technologically savvy user can be taught to do so.While in other spoofing attack,we cannot stop the spoofer from the spoofed message.
Comments
Post a Comment
Thanks For Your Valuable Comment.