Group Members:-
• Saisudha 05• Ankita Banka 07• Joveria Beg 09• Tejal • Pooja • Arthy Nair 41
AuthenticationAuthorizationClient-side AttacksCommand ExecutionInformation DisclosureLogical Attacks
Various forms of Stealing of Password
• Password Guessing• Default Passwords• Dictionary-based Attacks• Brute-force Attack• Fake-login Programs• Packet-Sniffing• Social Engineering
It consumes the resources of a remote host or network that would otherwise be used for serving legitimate users
Ping of Death
C:\>ping 192.168.10.10Pinging 192.168.10.10 with 32 bytes of data:Reply from 192.168.10.10: bytes=32 time=1ms TTL=150Reply from 192.168.10.10: bytes=32 time=1ms TTL=150Reply from 192.168.10.10: bytes=32 time=1ms TTL=150Reply from 192.168.10.10: bytes=32 time=1ms TTL=150Ping statistics for 192.168.10.10:Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),Approximate round trip times in milli-seconds:Minimum = 1ms, Maximum = 1ms, Average = 1msC:\>
Tear Drop
SYN Flooding Attack
LAND Attack
Smurf Attack
UDP Flooding Attack
Forms of attack1) Protocol failures
BOTNETS