The art of defense evasion — part 4 — Spoofing

Tricking the real entity to do some malicious tasks.

Osama Ellahi
2 min readJul 2, 2022

Introduction to Spoofing

Spoofing is mimicking some entity and asking the user to perform certain action according to the intention of an attacker. It includes both technical and non-technical stuff. Mostly it is dependent on the information that you use for tricking the victim. If the information is more related to the victim than there is more chance that he/she can be tricked. Spoofing is a major part of phishing, without better spoofing phishing campaign may result in failure.

When you are sending email form your public server from “PHP” or some other language you have to tell the server put this email in header in place of “From email” and send the mail using this following function.

mail($to,$subject,$txt,$headers);

Full blog is moved to personal website, where you can see What is Spoofing in cybersecurity | How to do Email Spoofing, Message Spoofing, IP and UserAgent Spoofing. To gain more knowledge, click on following link

https://breachnova.com/blog.php?id=26

--

--

Osama Ellahi
Osama Ellahi

Written by Osama Ellahi

I am cyber security reseacher and I love to meet new people in cyber industry to discuss new ideas. More Blogs : https://breachnova.com

No responses yet