Cyber Attacks, Network Attacks, Threats and Mitigation

cyber-attacks-network-attacks-ipcisco.com

Cyber Attacks, Network Attacks, Threats, Vulnerabilitis and Mitigation

There are various Network Attacks and various ways to prevent yourself from the attackers. In this lesson we will focus what are these Network Attacks, Cyber Attacks.

So, what are the types of Network Attacks (Cyber Attacks)?

 

  • Denial of Service (DoS) Attack
    • TCP SYN Flood Attack
    • Ping of Death
    • Teardrop Attack
    • Smurfing

 

  • Man-in-the-Middle Attacks
    • Session Hijacking
    • Replay Attacks
    • IP Spoofing
    • ARP Spoofing
    • DNS Spoofing
    • HTTPS Spoofing

 

  • Password Attacks
  • Malware Attacks
    • Viruses
    • Worms
    • Trojan Horses
    • Adware
    • Spyware

 

  • Reconnaissance Attacks
    • Packet Sniffing
    • Port Scanning
    • Phishing
    • Social Engineering
    • Dumster Diving
    • Usenet tools
    • DNS Reconnessaince

 

  • Other Attacks
    • Unauthorized Access
    • WareZ
    • Rerouting

 


 

Denial of Service (DoS) Attacks

Denial of Service (DoS) Attack is a cyber attack type that aims to maket he victim system unusable. There are different types of DoS Attacks according to their type:

  • Vulnerability DoS Attacks
  • Bandwidth Flooding DoS Attacks
  • Connection Flooding DoS Attacks

 

Vulnerability DoS Attacks are done to crash the system by determining and focusing its vulnerable parts.

The aim  of Bandwidth Flooding DoS Attacks are to clog the victim system with too much requests, traffic etc.

DoS-Attack-IPCisco.com

Lastly Connection Flooding DoS Attacks are done with too much half or full open connections. After a while system can not reply to these requests.

There is also an enhanced version of DoS Attacks. These are DDoS (Distributed DoS) Attacks. With DDOS Attacks,  attacker attacks from many devices o the victim device. So, it is difficult to detect the source of this attacks.

 

By the way let’s also define an important term, Botnet. Botnet is a private computer that has infected form any malicious software and because of this, it is controlled without the victim’s knowledge to do malicious attacks to others. DDoS (Distributed DoS) Attacks are done over such systems.

DDoS-Attack-IPCisco.com

There are different namings for specific types of DoS Attacks. These are:

  • TCP SYN Flood Attack
  • Ping of Death
  • Teardrop Attack
  • Smurfing

 


 

TCP SYN Flood Attack

TCP SYN Flood Attack is the attack with which attacker sends too much connection request to the target and if it gets reply, attacker never replies back. Waiting for timeout and too much requests fills the victim system queues.

 

tcp-syn-flood-attack-ipcisco.com

 

To protect your system form TCP SYN Flood, you can use firewall that stops incoming SYN packets. Another proactive solution is increasing the size of the connection queue and decreasing the connection timeout value.

 


 

Ping of Death

Ping of Death is the attack type that  sends ping packet to the victim over maximum 65535 value. And before sending this, attacker fragments the packet because this size is not allowed. At the other end, the victim, reassembeles this packet and its buffer crashes.

 

ping-of-death-attack-ipcisco.com

 

To protect your system from Ping of Death, you can use a firewall and on firewall you can check fragmented packets, if their size is normal or not.

 


 

Teardrop Attack

Teardrop Attack is the attack that is done via packet length and fragmentation offset parts. Attacker sends fragmented packets like ping of death. The target, can not reassible this packet because of a bug about TCP/IP fragmentation. The packets overlap and the system crashes.

 


 

Smurfing

Smurfing is the attacks type that is done via too much ICMP Echo (Ping) and aims to exhaust system resources. With Smurfing, attackers behaves like a victim’S trusted IP address and sends many ICMP Echo messages to a broadcast address. All the devices in this broadcast domain sends ICMP Reply to this ECMP Echos. So, in a short time the system traffic increase and resoruces exhaust.

smurfing-attack-ipcisco.com

 


 

Man-in-the-Middle Cyber Attacks

Man-in-the-Middle Attacks (MiTMs) are one of the most widely used attack types for today’s Cyber Attacks. It is also known as Eavesdropping (Snooping). In a Man-in-the-Middle Attack there are three players. These players are:

  • Client (Victim)
  • Server (The destination that the client are connecting)
  • Attacker (The “Man” in the Middle)

 

Man-in-the-middle-attacks-ipcisco.com

 

In normal communcation, client connect to the server and the data traffic occurs. But with Man-in-the-Middle Attack, the attacker enters between the Client and the Server. The attacker achieves this with various techniques and because of that victim is unaware of what is going on. He/She thinks that, the connection is still towards the destination. But after a successfull Man-in-the-Middle Attack, the data traffic comes to the attacker’s device not the exact destination.

 

Man-in-the-Middle Attacks are mainly used for stealing valuable information about the victims. This can be important passwords, banking details or any other secret information. Man-in-the-Middle Attacks can be done on different layers of the well-known OSI Model.

According to its affect type, we can devide  Man-in-the-Middle Attacks into two. These Man-in-the-middle Attacks types are :

  • Passive Man-in-the-Middle Attacks (Passive MiTM)
  • Active Man-in-the-Middle Attacks (Active MiTM)

 

In Passive Man-in-the-Middle Attacks, the attacker only listens the traffic between the victim and the other end. Attacker  listens, captures and records the traffic between these two ends, but it do not make any modification on the packets. Packets are tranfered unchanged between these two ends again but with a big problem. The problem is an unauthorized person, attacker knows whole the communication between these two ends.

 

In Active Man-in-the-Middle Attacks, the attacker listens, captures and records the traffic between two end points again. But here, there is another big problem. The attacker, damages the integrity of the data, it manuplates the packets. Modified and changed packets are send to each end. So, Active Man-in-the-Middle Attacks are more dangerous that Passive Man-in-the-Middle Attacks. With this attacks, the attacker make any victim to do what the attackers want with manuplated packets.

 

The are also some different namings for specific MiTM Attacks. These are:

  • Session Hijacking
  • Replay Attacks
  • IP Spoofing
  • ARP Spoofing
  • DNS Spoofing
  • HTTPS Spoofing

 


 

Session Hijacking Cyber Attacks

Session Hijacking is an old cyber attack type with which the attacker receives the traffic between two victioms by  capturing the session between them. In this type of attacks, receiver and sender things that they are communication directly with the other end. But, in real, their traffic goes to the attacker.

session-hijacking-attacks-ipcisco.com

 


 

Replay Cyber Attacks

Replay Cyber Attacks are the attacks with which the attacker eavesdrops the traffic between two points, intercepts the traffic and sends requests as he/she is a legitimate user. By doing this, attacker receies the requested data from the destination. Source of the request and the answered destination do not aware of this process. The attacker receives all the information requested.

For example if you request a payment with your credentials and if your data is intercepted by the hacker with a replay attack, then, attacker can imitate your request and send it to the destination as he/she is the legitimate user. At the destination, your reuest will processed and your requested money will sent to the attackers account.

 

replay-attacks-ipcisco.com

 


 

IP Spoofing

IP Spoofing is the process of tricking a victim via trusted IP packets.  Here, the attacker sends a modified  IP packet that has a trusted IP Source address to the victim host. The host accepts this packet because of the fact that it assumes that it is coming from a secure end. After that, the traffic  from the victim goes to the attacker instead of the real trusted destination.

 

ip-spoofing-attacks-ipcisco.com

 

Attackers do IP Spoofing by having a trusted range IP addresses. These IP addresses are in your IP address range. After having such an IP addresses, it is easy to enter your network. So, they acks as they are in your network, they can change configurations, they can send emails, they can do anything like any other user in this network. IP Spoofing is a very dangerous attack.

To protect your company network from IP Spoofing,  you can use Access-lists. With Access-lists, you can limited incoming traffic from the outside. But what if this attack is done from inside? So, Access-lists can not be a certain solution for IP Spoofing.  

 


 

ARP Spoofing

As you know ARP is the protocol tat links IP addresses to MAC addresses. With ARP processes in OSI layer 2, devices in the network learnes their MAC addresses each other and create ARP tables that includes IP-ARP machings.  After this learning process, communication is done through this ARP table instead of asking “What is x.x.x.x IP’s MAC?” question every time.

 

arp-spoofing-attacks-ipcisco.com

 

In ARP spoofing, attacker link its own MAC address with a trusted IP address in that network. By doing this, attacker manuplates the ARP table. When the victim host want to send a packet to that IP address  according to records of ARP table, it sends the traffic to the attacker. From the victim’s point of view, everything seems normal. ARP table seems secure and it sends the packet according to the ARP table. It do not know that, IP-MAC linking in the ARP table, will send its traffic to the attacker’s malicious device. Dynamic ARP Inspection can be a good solution to protect your network from such attacks.

 


 

DNS Spoofing

DNS is the mechanims that resolves Domain names to IP addresses. With DNS Spoofing attack, the attacker manuplated the DNS cache information of the victim’s and forces the victim to go to another website instead of the exact destination website. Here, victim thinks that, he/she is in a tursted exact website but at the backplane he/she is not.

 

dns-spoofing-attacks-ipcisco.com

 

The main aim of this DNS Spoofing attacks are stealing the Authentication information of the user. User write his/her usernames, passwords etc. on the fake website, and the attacker sees all the details clearly. After this attack type, with their Authentication information, attacker can login to the system and can do malicious activities.

 


 

HTTPS Spoofing

As you know, HTTPS is a secure protocol and developed as an enhanced version of HTTP. Many website on Internet, especially e-commerce website uses HTTPS to confirm their website safe and secure.  With HTTPS Spoofing, this safe websites can be imitated. An attacker tricks the browsers and force the browser to accept the unsecure malicious attacker website as safe. It does a redirection and victim find himself/herself in a malicious website. Here, the aim is stealing Authentication information of the users.

 


 

Password Attacks

Password Attacks are the attacks that tries to steal your passwords and access your systems via this passwords.

Attackers can use many different programs for Password Attacks. With this programs they can try to guess your password with many attemps. If an attacker use such a way to have yor passwords, this is called Brute Force Attack.

 

brude-force-attacks-ipcisco.com

 

To protect your system from such cyber attacks, you should use strong passwords. This can be also forced on the companies that has many users. Because weak passwords are easy to guess and they are easy to captured via different Brute Force Attack Programs. So, your passords must be a value that can not be guessed.

 


 

Malware Cyber Attacks

Malware Attacks are done via malicious softwares that is loaded to your system without your permission. And with this action, it aims to damage your system, steal your information or for other malicious behaviors.

 

malware-attacks-ipcisco.com

 

There are different harmful Malwares. Some of them aregiven below:

  • Viruses
  • Worms
  • Trojan Horses
  • Adware
  • Spyware

Lesson tags: cyber attacks, network attacks, network security
Back to: CCNA 200-301 v1.1 > Security Fundamentals

Leave a Reply

Your email address will not be published. Required fields are marked *

CCNA 200-301 v1.1

Collapse
Expand