Question: 1.chooses one attack (from different layers) below and do independent study on the chosen topics. 2.prepare detailed presentation (10 min) with ppt file Describe the

1.chooses one attack (from different layers) below and do independent study on the chosen topics.

2.prepare detailed presentation (10 min) with ppt file

Describe the attack and the prevention (or detection or mitigation) methods

The port scanning or port enumeration techniques attacks

SCTP Cookie Echo Scan

Spear-phishing

Banner grabbing

Web-based Directory Enumeration Attack

FTP bounce scanning

ARP (Address Resolution Protocol) scan

Vanilla attack

SNMP Enumeration

Layer 2 attacks or lower layer attacks

VLAN hopping,

MAC address spoofing, MAC flooding

Spanning-Tree Attack

Jamming Attack

Vulnerability on Neighbor Discovery Protocol (NDP)

GARP Attacks/ARP poisoning

Private VLAN Proxy Attack

MAC flooding, MAC spoofing and ARP flood attacks

Authentication/Association flood attack and deauthentication/disassociation flood attack

Layer 3 (or Router) attacks

DNS Rebinding and Route Table Poisoning

Cross-Site Request Forgery (CSRF)

Max Sequence Number Attack via OSPF

BGP Router Attacks

RIP Attack

Heap and Stack Overflow Attacks

DHCP Starvation/ DHCP Consumption Attack/DHCP Exhaustion Attack

Peer-to-Peer and Smurf attacks

Routing Table Modification and Denial of Service Attacks

Denial of Service Attacks- SYN Floods

OSPF and XSS attacks

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!