Summary

This chapter covered various forms of spoofing, including IP spoofing, email spoofing, web spoofing, and non-technical spoofing attacks. All of these types of attacks can have a detrimental effect on a company and cause a lot of damage. Only by understanding how they work can you be in a better position to prevent these types of attacks. One other word of caution: Even though I showed you how to perform various types of spoofing attacks, it was only done so that you can better protect your site. They should never be used against a site where you do not have written permission. They might seem like fun, but you can find yourself in a lot of legal trouble if you perform spoofing without permission.

Get Hackers Beware now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.