Final

Preview:

Citation preview

Group Members:-

• Saisudha 05• Ankita Banka 07• Joveria Beg 09• Tejal • Pooja • Arthy Nair 41

AuthenticationAuthorizationClient-side AttacksCommand ExecutionInformation DisclosureLogical Attacks

Various forms of Stealing of Password

• Password Guessing• Default Passwords• Dictionary-based Attacks• Brute-force Attack• Fake-login Programs• Packet-Sniffing• Social Engineering

It consumes the resources of a remote host or network that would otherwise be used for serving legitimate users

Ping of Death

C:\>ping 192.168.10.10Pinging 192.168.10.10 with 32 bytes of data:Reply from 192.168.10.10: bytes=32 time=1ms TTL=150Reply from 192.168.10.10: bytes=32 time=1ms TTL=150Reply from 192.168.10.10: bytes=32 time=1ms TTL=150Reply from 192.168.10.10: bytes=32 time=1ms TTL=150Ping statistics for 192.168.10.10:Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),Approximate round trip times in milli-seconds:Minimum = 1ms, Maximum = 1ms, Average = 1msC:\>

Tear Drop

SYN Flooding Attack

LAND Attack

Smurf Attack

UDP Flooding Attack

Forms of attack1) Protocol failures

BOTNETS