Case Study on
COMPUTER NETWORKS
SHIVAM BAJAJ
When You have Network , You have given Access of your Social Life to that Network .
Top Network Attacks
• Ransomware - Attackers manages to get a malicious file onto
your servers with the use form of phishing . Using phishing
keystroke logging files also managed .
• IOT - It is a growing field . no. of devices are increasing and
attack on that can cause chaos on enormous scale due to
unsecured digital devices or old protocols used .
• Social Engineering - It implies deceiving someone with
purpose of acquire sensitive information , like passwords ,
credit cards . Clone Phishing is used in this
• MIM Attacks - Session Hijacking . Spoofing .
• DOS - Denial of service attack , it is malicious attempt to
make a server or network resource unavailable to users ,
usually by suspending the services of hosts .
• DDOS - Distributed Denial of Service Attack
• SQL Injection - It is an SQL code injection technique ,
used to attack data driven app , in which malicious queries
are inserted into entry field for execution .
Typical Web Application Set Up
• SSL(Secure Sockets Layer ) is protocol for establishing
encrypted links b/w server and browser .
• It is the predecessor to TLS .
• When server return pages with https links , attacker
changes them to http and when browser uses links , MITM
intercepts and creates its own https con with server
• Result MITM sees all the packets in that network .
• Using nectar and OpenSSL , 2 line proxy can be created .
• listen on 80 port on host and redirect requests to port 443.
SSL Stripping
• URL Misinterpretation - Web servers fails to parse the
URL properly . eg - Unicode/ Superflous decode attack .
• Directory Browsing - ability to retrieve complete directory
listing within directories on web server . usually happens
when default document is missing .
• Reverse proxy server - proxy that typically sits behind the
firewall in private network and direct client to backend
server and provides an additional level of abstraction .
eg Compaq Insight manager .
• Java Decompilation - Java Byte code can be decompiled
quite effectively and disclose sensitive info like password.
• Source Code Disclosure - Ability to retrieve app files in
unparsed manner and can recover code . the code then
can be used to find further loopholes/trophies.
• Input Validation - Root cause of most web attacks .
Tampering with hidden fields , Bypassing client side
checking eg javascript .
• Butter Overflows - flaw that occurs when more data is
written to buffer , can cause DOS . Application Input Fields
eg - ColdFusion Dos .
• Fragrouter - network intrusion detection evasion toolkit . It
implements Insertion , Evasion and DOS attack .
Vulnerabilities in Layers of
OSI Model .
• Physical Layer - Physical destruction , obstruction ,
manipulation or malfunction of physical assets .
• Data Link layer - Mac flooding attack inmates switch with
data packets .
• Network Layer - ICMP flooding , attacker uses ICMP
messages to overload targeted network’s bandwidth .
• Transport Layer - SYN Flood , Smurf attack .
• Session Layer - attacker exploits a flaw in server software
running on switch,rendering telnet services unavailable .
• Presentation Layer - SSL stripping & Malformed SSL
requests , to tunnel HTTP attacks to the target server .
• Application Layer - DDos attack .Get requests , HTTP GET
HTTP Post , = website forms .
Computer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptx

More Related Content

PDF
Protecting Web Services from DDOS Attack
PPT
Internet Security
PPTX
Cryptography and Network security # Lecture 3
PPTX
3-types of attacks_Types of attacks.pptx
PPTX
DDOS ATTACKS
PPSX
Web application security
PDF
Anatomy of a Cloud Hack
PPTX
Security Threats at OSI layers
Protecting Web Services from DDOS Attack
Internet Security
Cryptography and Network security # Lecture 3
3-types of attacks_Types of attacks.pptx
DDOS ATTACKS
Web application security
Anatomy of a Cloud Hack
Security Threats at OSI layers

Similar to Computer Network Case Study - bajju.pptx (20)

PPTX
640-554 IT Certification and Career Paths
PPTX
Web & Cloud Security in the real world
PPTX
Security concepts
PPT
CS10NETWOKSecurityhdhgsfdhsdheahgqergd.ppt
PPTX
Secure Android Development
PDF
How to hack a telecom and stay alive
PDF
Sergey Gordeychik - How to hack a telecom and stay alive
PPT
Isys20261 lecture 09
PPTX
How to hack a telecommunication company and stay alive. Sergey Gordeychik
PPT
Network sec 1
PPTX
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
PPTX
Types of Attack in Information and Network Security
PDF
Unit 6_DoS and DDoS_SQL Injection_tools.pdf
PPTX
Website Hacking and Preventive Measures
PDF
How we breach small and medium enterprises (SMEs)
PPTX
Information Security Systems
PPTX
Botnets Attacks.pptx
PPTX
Types of attack
PPT
Security and Linux Security
PPT
Computer Security
640-554 IT Certification and Career Paths
Web & Cloud Security in the real world
Security concepts
CS10NETWOKSecurityhdhgsfdhsdheahgqergd.ppt
Secure Android Development
How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay alive
Isys20261 lecture 09
How to hack a telecommunication company and stay alive. Sergey Gordeychik
Network sec 1
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Types of Attack in Information and Network Security
Unit 6_DoS and DDoS_SQL Injection_tools.pdf
Website Hacking and Preventive Measures
How we breach small and medium enterprises (SMEs)
Information Security Systems
Botnets Attacks.pptx
Types of attack
Security and Linux Security
Computer Security
Ad

Recently uploaded (20)

PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
737-MAX_SRG.pdf student reference guides
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PPTX
Feature types and data preprocessing steps
PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
PDF
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
communication and presentation skills 01
PPTX
introduction to high performance computing
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PPT
Total quality management ppt for engineering students
PPTX
Fundamentals of Mechanical Engineering.pptx
PPTX
Module 8- Technological and Communication Skills.pptx
PPTX
Management Information system : MIS-e-Business Systems.pptx
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
"Array and Linked List in Data Structures with Types, Operations, Implementat...
Categorization of Factors Affecting Classification Algorithms Selection
737-MAX_SRG.pdf student reference guides
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
Feature types and data preprocessing steps
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
communication and presentation skills 01
introduction to high performance computing
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
Total quality management ppt for engineering students
Fundamentals of Mechanical Engineering.pptx
Module 8- Technological and Communication Skills.pptx
Management Information system : MIS-e-Business Systems.pptx
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
Ad

Computer Network Case Study - bajju.pptx

  • 1. Case Study on COMPUTER NETWORKS SHIVAM BAJAJ
  • 2. When You have Network , You have given Access of your Social Life to that Network .
  • 3. Top Network Attacks • Ransomware - Attackers manages to get a malicious file onto your servers with the use form of phishing . Using phishing keystroke logging files also managed . • IOT - It is a growing field . no. of devices are increasing and attack on that can cause chaos on enormous scale due to unsecured digital devices or old protocols used . • Social Engineering - It implies deceiving someone with purpose of acquire sensitive information , like passwords , credit cards . Clone Phishing is used in this • MIM Attacks - Session Hijacking . Spoofing .
  • 4. • DOS - Denial of service attack , it is malicious attempt to make a server or network resource unavailable to users , usually by suspending the services of hosts . • DDOS - Distributed Denial of Service Attack • SQL Injection - It is an SQL code injection technique , used to attack data driven app , in which malicious queries are inserted into entry field for execution .
  • 6. • SSL(Secure Sockets Layer ) is protocol for establishing encrypted links b/w server and browser . • It is the predecessor to TLS . • When server return pages with https links , attacker changes them to http and when browser uses links , MITM intercepts and creates its own https con with server • Result MITM sees all the packets in that network . • Using nectar and OpenSSL , 2 line proxy can be created . • listen on 80 port on host and redirect requests to port 443. SSL Stripping
  • 7. • URL Misinterpretation - Web servers fails to parse the URL properly . eg - Unicode/ Superflous decode attack . • Directory Browsing - ability to retrieve complete directory listing within directories on web server . usually happens when default document is missing . • Reverse proxy server - proxy that typically sits behind the firewall in private network and direct client to backend server and provides an additional level of abstraction . eg Compaq Insight manager . • Java Decompilation - Java Byte code can be decompiled quite effectively and disclose sensitive info like password.
  • 8. • Source Code Disclosure - Ability to retrieve app files in unparsed manner and can recover code . the code then can be used to find further loopholes/trophies. • Input Validation - Root cause of most web attacks . Tampering with hidden fields , Bypassing client side checking eg javascript . • Butter Overflows - flaw that occurs when more data is written to buffer , can cause DOS . Application Input Fields eg - ColdFusion Dos . • Fragrouter - network intrusion detection evasion toolkit . It implements Insertion , Evasion and DOS attack .
  • 9. Vulnerabilities in Layers of OSI Model .
  • 10. • Physical Layer - Physical destruction , obstruction , manipulation or malfunction of physical assets . • Data Link layer - Mac flooding attack inmates switch with data packets . • Network Layer - ICMP flooding , attacker uses ICMP messages to overload targeted network’s bandwidth . • Transport Layer - SYN Flood , Smurf attack . • Session Layer - attacker exploits a flaw in server software running on switch,rendering telnet services unavailable . • Presentation Layer - SSL stripping & Malformed SSL requests , to tunnel HTTP attacks to the target server . • Application Layer - DDos attack .Get requests , HTTP GET HTTP Post , = website forms .