IP Spoofing Anthony Pell 1 min read Nov 23, 2004 This documentation discusses how an attacker can conduct an IP Spoofing attack. A spoofing attack involves forging one's source address. It is the act of using one machine to impersonate another. Prev: Network monitoring, access control, and booby traps using TCP Wrappers Next: Steps for Recovering from a UNIX or NT System Compromise