Denial of Service
Overload service. Could be unintentional or a network issue.
Distributed denial of service
Denial of service with botnet
Vlan Hopping
Switching between different Vlans through switch spoofing or double tagging
Switch spoofing
Pretending to be a switch to make a trunk connection and allowing a way into other vlans. Vulnerability with trunk negotiations
Double tagging
Packet has two vlan tags which goes through one vlan, gets the tag removed, and goes to another. One-way, no info out.
MAC flooding
Flood the limited MAC address table with many MAC addresses, forcing legitimate MAC addresses out and making traffic transmitted to all interfaces
Spoofing
Faking
ARP poisoning
IP Spoofing. Attacker intercepts ARP request and slips in their own device. Man in the middle
DNS poisoning
DNS request spoofing. Similar to ARP poisoning but with DNS. Man in the middle
Rogue DHCP server
DHCP isn’t inherently secure so an unauthorized server can assign IP addresses. Can be fixed with authorized DHCP servers and enabling DHCP snooping. Remove rogue server and renew IP leases
Rogue AP
Unauthorized wireless access point. Potential weak entry point. Find with network scans and consider using network access control
Wireless evil twin
SSID spoofing to try to capture wifi hotspot users
Social engineering
Fooling users into giving information
Shoulder surfing
Someone else looking at your screen while you’re unaware
Tailgating/piggybacking
Using someone else’s entry, like getting in when someone else unlocks and opens a door
Dumpster diving
Trash may have valuable information. Should be shredded
Malware
Malicious software