Forge your identity. Spoof the source. Attack from shadows by manipulating IP packet headers to hide your origin.
IP Spoofing is forging the source IP address in network packets to hide the attacker's identity or impersonate another device. The attacker changes the "From" address in IP packets to make it appear traffic comes from a trusted source.
Attacker sends packets with fake source IP but can't see responses. Used for DDoS (attacker doesn't need replies).
Attacker is on same subnet, can sniff responses even with spoofed IP. More dangerous - enables session hijacking.
Spoof victim's IP as source, send requests to many servers. Servers flood victim with responses (amplifies attack 10-100x).
Forge Source IPs to Bypass Firewall Rules
When you spoof a source IP, the server replies to the Real Owner of that IP, not you.