{"id":73,"date":"2021-01-19T10:46:00","date_gmt":"2021-01-19T05:16:00","guid":{"rendered":"http:\/\/signals.dmarcsonar.com\/?p=73"},"modified":"2021-03-06T11:42:56","modified_gmt":"2021-03-06T06:12:56","slug":"difference-between-phishing-and-spoofing","status":"publish","type":"post","link":"https:\/\/www.tikaj.com\/blog\/difference-between-phishing-and-spoofing\/","title":{"rendered":"Difference between Phishing and Spoofing"},"content":{"rendered":"

What is Phishing?<\/p>\n

phishing is a form of criminal activity using social engineering techniques, characterized by attempts to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an apparently official electronic communication, such as an email or an instant message. The term phishing arises from the use of increasingly sophisticated lures to “fish” for users’ financial information and passwords.
\nWith the growing number of reported phishing incidents, additional methods of protection are needed. Attempts include legislation, user training, and technical measures.<\/p>\n

What is Spoofing?
\nSpoofing is the creation of TCP\/IP packets using somebody else’s IP address. Routers use the “destination IP” address in order to forward packets through the Internet, but ignore the “source IP” address. That address is only used by the destination machine when it responds back to the source.
\nA common misconception is that “IP spoofing” can be used to hide your IP address while surfing the Internet, chatting on-line, sending e-mail, and so forth. This is generally not true. Forging the source IP address causes the responses to be misdirected, meaning you cannot create a normal network connection.
\nHowever, IP spoofing is an integral part of many network attacks that do not need to see responses (blind spoofing).
\nExamples of spoofing:
\nman-in-the-middle
\npacket sniffs on link between the two end points, and can therefore pretend to be one end of the connection
\nrouting redirect
\nredirects routing information from the original host to the hacker’s host (this is another form of man-in-the-middle attack).
\nsource routing
\nredirects indvidual packets by hackers host
\nblind spoofing
\npredicts responses from a host, allowing commands to be sent, but can’t get immediate feedback.
\nflooding
\nSYN flood fills up receive queue from random source addresses; smurf\/fraggle spoofs victims address, causing everyone to respond to the victim.<\/p>\n","protected":false},"excerpt":{"rendered":"

What is Phishing? phishing is a form of criminal activity using social engineering techniques, characterized by attempts to fraudulently acquire sensitive information, […]<\/p>\n","protected":false},"author":120,"featured_media":222,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[31,548],"tags":[],"class_list":["post-73","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-phishing","category-spoofing"],"_links":{"self":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts\/73","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/users\/120"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/comments?post=73"}],"version-history":[{"count":2,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts\/73\/revisions"}],"predecessor-version":[{"id":2618,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts\/73\/revisions\/2618"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/media\/222"}],"wp:attachment":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/media?parent=73"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/categories?post=73"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/tags?post=73"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}