Question
1.chooses one attack (from different layers) below and do independent study on the chosen topics. 2.prepare detailed presentation (10 min) with ppt file Describe the
1.chooses one attack (from different layers) below and do independent study on the chosen topics.
2.prepare detailed presentation (10 min) with ppt file
Describe the attack and the prevention (or detection or mitigation) methods
The port scanning or port enumeration techniques attacks
SCTP Cookie Echo Scan
Spear-phishing
Banner grabbing
Web-based Directory Enumeration Attack
FTP bounce scanning
ARP (Address Resolution Protocol) scan
Vanilla attack
SNMP Enumeration
Layer 2 attacks or lower layer attacks
VLAN hopping,
MAC address spoofing, MAC flooding
Spanning-Tree Attack
Jamming Attack
Vulnerability on Neighbor Discovery Protocol (NDP)
GARP Attacks/ARP poisoning
Private VLAN Proxy Attack
MAC flooding, MAC spoofing and ARP flood attacks
Authentication/Association flood attack and deauthentication/disassociation flood attack
Layer 3 (or Router) attacks
DNS Rebinding and Route Table Poisoning
Cross-Site Request Forgery (CSRF)
Max Sequence Number Attack via OSPF
BGP Router Attacks
RIP Attack
Heap and Stack Overflow Attacks
DHCP Starvation/ DHCP Consumption Attack/DHCP Exhaustion Attack
Peer-to-Peer and Smurf attacks
Routing Table Modification and Denial of Service Attacks
Denial of Service Attacks- SYN Floods
OSPF and XSS attacks
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started