IP Vulnerabilities Flashcards
ICMP Attacks
Threat actors can use ICMP echo packets (pings) to discover subnets and hosts on a protected network with the goal of generating DoS flood attacks, and to alter host routing tables.
DoS Attacks
Threat actors attempt to prevent legitimate users from accessing information or services.
DDoS Attacks
Similar to DoS, but features a simultaneous, coordinated attack from multiple source machines.
Address spoofing attacks
Threat actors spoof the source IP address in an attempt to perform blind spoofing or non-blind spoofing.
On-path or MITM
Threat actors position themselves between a source and destination to transparently monitor, capture, and control the communication of data. Could simply eavesdrop by inspecting captured packets or alter packets and forward them to their original destination.
Session hijacking
Threat actors gain physical access to the network and then use an on-path attack to hijack a session.