What is IP spoofing and social engineering?
IP spoofing is a technique used to gain unauthorized access to computers, whereby the attacker sends messages to a computer with a forged IP address indicating that the message is coming from a trusted host. The target host may accept the packet and act upon it. It will allow the attacker to access the target system. The attacker can use tools such as hping2 and nessuss, among others, to initialize the attack. Hping2 is notable because it contains a host of other features besides OS fingerprinting, such as TCP, UDP, ICMP, and a raw of IP ping protocols, traceroute mode, and the ability to send files between the source and the target system. Hping2 can be used to traceroute hosts behind a firewall that blocks attempts using the standard traceroute utilities. Also, hping2 can use the TCP to verify if a host is up even if ICMP packets are being blocked. Hping2 has the ability to camouflage the last step of a three-way handshake. This kind of scan is known as a SYN or stealth scan (also kn