Network Attacks
There are numerous attacks that can exploit network connections. These attacks are generally among the most complex because they also use other types of attacks, such as exploits and Trojan horses. Among the most common attacks that can exploit network connections are the following.
Backdoor
It is an attack technique that exploits "hidden" ports left open by system administrators to more easily perform system maintenance operations. A backdoor can also be activated by a "Trojan" program. which creates a network access point to the computer by activating an unauthorized service listening on a specific TCP or UDP port.
Port scanning
It involves scanning all possible TCP/UDP ports open on a host to study their configuration and identify weaknesses or points of attack.
Sniffing
It is the interception of packets traveling on the network to which the attacker's computer is connected. The target is The aim is to steal confidential information transmitted "in clear."
Keylogging
It involves intercepting (using malware software or hardware devices connected to the attacked computer) data typed on the keyboard by the user during normal work sessions.
Spoofing
With spoofing, the attacker falsifies the identity of the sender of a network packet. It can occur at any level of the ISO/OSI stack: for example, it can be Forge an IP address, MAC address, or DNS hostname.
DoS/DDoS
DoS (Denial of Service) or DDoS (Distributed Denial of Service) attacks are conceptually the same type, but they differ in that in DoS, the attack originates from a single computer, while in DDoS, the attack originates from multiple computers connected to the network. As a result, a DDoS attack is much more damaging and difficult to neutralize. The attacking computers—sometimes unknowingly, because they are infected with Trojans that run the malicious program—use known and open connection ports for providing services. They aim to saturate the resources of the server under attack (e.g., the number of simultaneous connections the server can handle) to the point where it is no longer possible to perform the attack. The services provided by the server are available.