MAC Spoofing
MAC Spoofing
IP Spoofing
IP Spoofing
SYN Flood Attack
SYN Flood Attack
Man-In-The-Middle
-What can prevent and how?
Man-In-The-Middle
ARP Poisoning
-Two kinds of attack
ARP Poisoning
DNS Poisoning
-What prevents?
DNS Poisoning
DDoS DNS Attack
DDoS DNS Attack
-Botnet machines repeatedly send queries to DNS servers, overwhelm them
Amplification Attack
Amplification Attack
Smurf Attack
Smurf Attack
DNS Amplification Attack
DNS Amplification Attack
NTP Attack
NTP Attack
Pass The Hash Attack
Pass The Hash Attack
Birthday Attack
Birthday Attack
Rainbow Table Attack
-How to prevent
Rainbow Table Attack
Replay Attack
-What prevents
Replay Attack
Known Plaintext Attack
Known Plaintext Attack
Chosen Plaintext Attack
Chosen Plaintext Attack
Session Hijacking
Session Hijacking
-Attacker uses user’s session ID (cookie) to impersonate user
Domain Hijacking
Domain Hijacking
Man-In-The-Browser
Man-In-The-Browser
Buffer Overflow Attack
Buffer Overflow Attack
Directory Traversal
Directory Traversal
Cross Site Scripting (XSS)
Cross Site Scripting (XSS)
Cross-Site Request Forgery (XSRF)
-How to prevent
Cross-Site Request Forgery (XSRF)