Network Security information
In today’s IT world it is very important to understand the necessity of security of network security and data protection.
To protect yourself and the network from any data theft and for avoiding things like website defacement, data corruption, we need to understand the ways in which they can be exploited.
There are numerous types of network attack, following are a few of them-
1) Denial of Service attack ( DoS ) or Distributed Denial of Service attack ( DDoS )
2) Social Engineering attacks
3) IP spoofing attack
4) DNS hijacking
5) Password sniffing attack (using brute force or Dictionary attack)
1) Denial of Service attack (DoS) or Distributed Denial of Service attack (DDoS)- These kind of attacks are generally executed so as to make the server unusable thereby damaging the company image
There are different types of DoS attacks-
i. SYN flood attack
ii. Ping of Death attack
iii. Smurf attack, etc.
2) Social engineering attack-
This type of attack does not need any technical skillset. It can be done via just listening to telephone conversation, talking to the different people in company so as to gather more information, collecting information from web, chat conversation or any documents that provide company related information.
This kind of information gathering is useful to find out the kind of OS, technology etc. that is used in the company.
3) IP spoofing attack-
In this kind of attack, the initiator spoofs the source ip address and sends packets to the destination. Here the destination computer replies back to the spoofed ip address.
It can be used to send fake information to look like if it is coming from authentic of reliable source. It is used to gain unauthorized access to the resources. However it can also be used to do DOS attack against the victim.
4) DNS Hijacking-
This kind of attack can be done by providing rogue DNS server in the infrastructure. This DNS server is then used to redirect legitimate DNS request towards dummy or malicious website/ service thereby allowing the user to login or to use the service and collect the information about the legitimate user. The information could be anything from
Login user name, password, mail address, etc.
5) Password sniffing attack-
This kind of attack is used to find out username and password credentials for a user. One can do it by sniffing the network traffic or by getting access to the authentication files. In Windows the example could be SAM database. This can be done even for services like telnet. The basic ways to get the information can be using brute force attack or dictionary attack.