An attack that falsifies transmitted data.
The aim of spoofing can be to gain enhanced privileges; it is based on bypassing verification mechanisms through spoof requests that imitate real ones. One such substitution involves the use of a fake HTTP header to gain access to hidden content.
Spoofing can also be aimed at user deception, a classic example being the substitution of sender addresses in email messages.