A kind of attack in which one system, program, or user successfully masquerades as another.
Spoofing attacks involve tricking or deceiving computer systems or other computer users. Spoofing can be carried out in several different ways. Some common attacks are:
- IP spoofing: Creating IP packets with a forged IP address.
- ARP spoofing: Creating ARP packets with an invalid IP-MAC pair. It is used to carry out MITM.
- E-mail spoofing: Sending an e-mail with a spoofed IP address.
There are many other attacks that involve spoofing e.g. caller ID spoofing, DNS spoofing.