0
2.6kviews
0
135views
written 6.1 years ago by |
Network Layer:- Protocol used IP
1. IP Spoofing:- (Most advance trick/attack that can be executed on a computer system)
- If Done correctly, it is one of the smoothest & hardest attacks on the internet.
- Very complicated attack.
It is a process that enables the attackers to hide the real identity when communicating with the target system, therefore, the data packets the attackers send will appear to originate at another system.
Eg:- Suppose source IP address is 203.45.98.01 & the address of the target system is 202.14.12.1. when the source sends a msg to the target system detect source IP address when we use spoof IP address.
2.Packet Sniffing:
- Sniffers could capture, interpret & save packets send across a network for analysis purposes when they were developed as a test for debugging network problems.
- Pocket sniffing is the act of capturing packets of data flowing across a computer network. The software or device used to do this is called a packet sniffer.
- Packet sniffing has a legitimate use to monitor network performance or troubleshoot problems with network communications.
3.RIP Security Attack:
- Routing Information Protocol is a dynamic routing protocol & an interior gateway protocol i.e. used to propagate routing information on local networks.
- The msgs received are unchecked by the reciever & so an attacker can take advantage of this.
- The Attackers intent can be to implement a route to a parcticular host that us unused.
Solution:
Disable $RIPV_1$ & $RIPV_2$ & enable MO5 based authentication.
Replace RIP with OSPF(Open Shorted Path First) which uses MO5 authentication.
ADD COMMENT
EDIT
Please log in to add an answer.