Attackers can make various identifying aspects of computers look like something else.
A MAC address for example is unique to every device connected to the internet.
However an attacker can temporarily change (spoof) this address to make it appear as something different.
I’ve seen Wifi networks that rely on MAC addresses as part of it’s identity system.
This is not a safe method by any means as an attacker can simply spoof his/her own MAC address to one that is already authorised on the network.
There are many other spoofing attacks that can be achieved including:
- Bluetooth MAC address spoofing
- DNS spoofing (which I cover in the next section)
- GPS spoofing on mobile devices
- Text Message (SMS) spoofing. An attacker can make a text message look like it’s from anyone he/she wants.
- Email spoofing
Rogue Wireless Access Points (AP’s) can be configured and deployed near a victims network by an attacker to entice victims to connect.
The attacker can send “disconnect” network packets to the victims computer which will then in turn, force it to reconnect.
Except it’s very possible for the victims computer to then “reconnect” to the attackers rogue access point instead.
This all takes place without the victim being aware of anything happening.