1. Hyperlink Spoofing
    Called Web Spoofing, persuades internet browser to connect to a fake server that appears to be a valid session
  2. Land Attack
    Spoofed TCP SYN packet with the target host's IP address and an open port acting both as a source and a destination to the target host on an open port, causes the system to freeze or crash because the machine continuously replies to itself
  3. ICMP packet spoofing
    Used by a smurf attack for DoS
  4. Smurf Attack
    DoS uses spoofed broadcast ping messages to flood target host. Uses ICMP echo packets with spoofed source IP address similar to the target host. Causes system to freeze or crash
  5. Network Address Hijacking
    Called Session hijacking, Reroute data traffic from a network device to a personal computer. Taking control of an existing connection
  6. Ping Sweep
    Untargeted hacker reconnaissance, sends ICMP messages to IP address to see which ones are used by communicating hosts
  7. Reset Scan
    Uses TCP RST packets to see which hosts are communicating on a network
  8. Stealth Scan
    Attempts to communicate with a range of IP addresses to see which hosts on a network are communicating
  9. Wardialing
    Hacker dials a block of phone numbers to see which computers on a network answer phone calls with a modem
  10. Ping Scanning
    Sends ICMP message to each IP address on network to see which IP addresses are active hosts on TCP/IP network
  11. Port Scanning
    Uses TCP triple handshake to scan ports on a network.
  12. TCP Half Scanning
    uses part of TCP triple hand shake to scan network ports
  13. FIN Scanning
    Uses a finish TCP packet, which disconnects a TCP connection, to scan for open network ports
  14. Repudiation Attack
    Causes an event to be denied, either hacker impersonates a legitimate user or hacker impersonates a legitimate computer on network
Card Set