29

Final

Embed Size (px)

Citation preview

Page 1: Final
Page 2: Final
Page 3: Final

Group Members:-

• Saisudha 05• Ankita Banka 07• Joveria Beg 09• Tejal • Pooja • Arthy Nair 41

Page 4: Final

AuthenticationAuthorizationClient-side AttacksCommand ExecutionInformation DisclosureLogical Attacks

Page 5: Final
Page 6: Final
Page 7: Final

Various forms of Stealing of Password

• Password Guessing• Default Passwords• Dictionary-based Attacks• Brute-force Attack• Fake-login Programs• Packet-Sniffing• Social Engineering

Page 8: Final
Page 9: Final
Page 10: Final
Page 11: Final

It consumes the resources of a remote host or network that would otherwise be used for serving legitimate users

Page 12: Final
Page 13: Final

Ping of Death

C:\>ping 192.168.10.10Pinging 192.168.10.10 with 32 bytes of data:Reply from 192.168.10.10: bytes=32 time=1ms TTL=150Reply from 192.168.10.10: bytes=32 time=1ms TTL=150Reply from 192.168.10.10: bytes=32 time=1ms TTL=150Reply from 192.168.10.10: bytes=32 time=1ms TTL=150Ping statistics for 192.168.10.10:Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),Approximate round trip times in milli-seconds:Minimum = 1ms, Maximum = 1ms, Average = 1msC:\>

Page 14: Final

Tear Drop

Page 15: Final

SYN Flooding Attack

Page 16: Final

LAND Attack

Page 17: Final

Smurf Attack

Page 18: Final

UDP Flooding Attack

Page 19: Final
Page 20: Final
Page 21: Final
Page 22: Final
Page 23: Final

Forms of attack1) Protocol failures

Page 24: Final
Page 25: Final
Page 26: Final
Page 27: Final

BOTNETS

Page 28: Final
Page 29: Final