Pages

Tuesday, November 28, 2017

Attack



Brute force attack


an attack on a password that repeatedly tries to re-create it through a random combination of characters.



Eavesdropping attack
Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)


Masquerading 

Impersonating another user, usually with the intention of gaining unauthorized access to a system


Spoofing attack

is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.




IP spoofing

IP spoofing takes advantage of the source-routing option in the IP protocol. With this option enabled, an attacker can insert a spoofed source IP address. The packet will travel the network according to the information within the source-routing field, bypassing the logic in each router, including dynamic and static routing passive attacksExamples of passive attacks include network analysis, eavesdropping and traffic analysis. Active attacks include brute force attacks, masquerading, packet replay, message modification, unauthorized access through the Internet or web-based services, denial-of-service attacks, dial-in penetration attacks, email bombing and spamming, and email spoofing.

No comments:

Post a Comment