-
Hyperlink Spoofing
Called Web Spoofing, persuades internet browser to connect to a fake server that appears to be a valid session
-
Land Attack
Spoofed TCP SYN packet with the target host's IP address and an open port acting both as a source and a destination to the target host on an open port, causes the system to freeze or crash because the machine continuously replies to itself
-
ICMP packet spoofing
Used by a smurf attack for DoS
-
Smurf Attack
DoS uses spoofed broadcast ping messages to flood target host. Uses ICMP echo packets with spoofed source IP address similar to the target host. Causes system to freeze or crash
-
Network Address Hijacking
Called Session hijacking, Reroute data traffic from a network device to a personal computer. Taking control of an existing connection
-
Ping Sweep
Untargeted hacker reconnaissance, sends ICMP messages to IP address to see which ones are used by communicating hosts
-
Reset Scan
Uses TCP RST packets to see which hosts are communicating on a network
-
Stealth Scan
Attempts to communicate with a range of IP addresses to see which hosts on a network are communicating
-
Wardialing
Hacker dials a block of phone numbers to see which computers on a network answer phone calls with a modem
-
Ping Scanning
Sends ICMP message to each IP address on network to see which IP addresses are active hosts on TCP/IP network
-
Port Scanning
Uses TCP triple handshake to scan ports on a network.
-
TCP Half Scanning
uses part of TCP triple hand shake to scan network ports
-
FIN Scanning
Uses a finish TCP packet, which disconnects a TCP connection, to scan for open network ports
-
Repudiation Attack
Causes an event to be denied, either hacker impersonates a legitimate user or hacker impersonates a legitimate computer on network
|
|