Week2 Module5 PDF
Week2 Module5 PDF
1
Objectives
2
Learning Outcomes
3
Outline
Typical Cyber-attack types
DoS and DDoS Attack
XSS attack
SQL injection attack
Man-in-the-middle attack
Birthday attack
Password attack
Eavesdropping attack
Phishing and spear phishing
Drive-by download attack
4
Most Common types of Cyber-attacks
5
DoS and DDoS Attack
6
DoS and DDoS Attack types
Dos and
DDoS Attack
Types
7
SYN flood attack
8
TCP SYN flood attack
• During TCP connection establishment the attacker
fills up the target machine with multiple connection
requests
• It makes target machine to timeout, awaiting for
permission to connect from the server
9
Tear Drop attack
• It is a DoS attack where fragmented packets
are sent to a target machine
• This makes the victim’s computer to crash
overwhelming with packets
Packet #1 IP ID = x
Packet length = 820
IP Header Fragment offset = 0
More fragments = 1
Packet #2
IP ID = x
IP Header Packet length = 820
Fragment offset = 800
More fragments = 0
10
Smurf attack
11
An Example for Smurf Attack
12
Ping of death attack
13
Botnets
• Botnets are millions of computers compromised
with viruses by the hacker who is under control
of DDoS attacks
• As these bots can be located anywhere, they
are generally very difficult to identify
14
Cross-site scripting attack (XSS Attack)
Attacker
Website Visitor
15
SQL injection attack
16
Man-in-the-middle attack (MITM Attack)
17
Types of MITM Attack
Session
Hijacking
MitM Attacks
Replay
IP Spoofing
Attack
18
Session hijacking
• This happens when a hacker hijacks the
established connection between a client and
server
• The attacker changes the IP address for a
trusted client
• Then it makes the computer believe it is
communicating with the actual server
19
An example of Session hijacking
20
IP Spoofing Attack
21
Replay Attacks
22
Birthday attack
23
Password attack
• It happens by guessing passwords randomly or
in systematic manner
Brute-force Attack
Dictionary Attack
24
Eavesdropping attack
• Hacking of user confidential information sent
over the network
• It occurs through the interruption of network
traffic
Eavesdropping
Attack
Active Passive
Eavesdropping Eavesdropping
Attack Attack
25
Phishing and Spear Phishing attacks
26
Example for phishing attack
27
Drive-by Download attack
28
Conclusion
29
Thank you
30