10. How does the Attack Work? 1 . Request Spoof URL www.attacker.org www.server.com 2. Request real URL 3. Real Page contents 4. Change page 5. Spoofed page Web spoofing
The text and pictures on a Web page might give some impression about where the page came from – corporate logo implies it came from a certain corporation.