Network Attacks

We have already learned about types of threats, actors, etc. Network attack is an attack in which intruder takes an unauthorized control over a company’s network using different techniques. This can cause heavy loss both at privacy levels and financially. We will now look more about them.

DNS Cache Poisoning

We know what DNS servers are! If not a quick recap. DNS servers are like the phone books of Internet. They look up for the IP address that is mapped to the domain name we have searched. This makes the work easy for the users to find the information. Okay, now what is DNS Cache Poisoning attack? It is the procedure of tricking a DNS server to accept a fake DNS record that will point a user to the compromised DNS Server. It will provide the user with fake DNS address when he tries to access any website.

DNS CP can spread over the networks too.  If other DNS servers are getting their DNS information from a compromised server, they’ll serve those bad DNS entries to other hosts. This attack may force users to install certain applets on their devices that may steal valuable information form the users.  Further reading.

Man in the middle attack(MitM):

Where an attacker establishes a position between the sender and recipient of electronic messages and intercepts them, perhaps changing them in transit like Mallory between Alice and Bob (reference). The sender and recipient believe they are communicating directly with one another. A MitM attack might be used in the military to confuse an enemy. More information.

Denial of Service (DoS)

This has already been discussed. Just to take a quick look in this type! It is an attack that tries to prevent access to a service for users by overwhelming the network or server. They actually flood the server with multiple requests, so that the servers would be crashed or sometimes become irresponsive. This requests will work for smaller websites with limited users. If the attackers target is to take down bigger services like Google, that would not be easier to send millions of requests. The Ping of Death or POD, is a pretty simple example of a DoS attack. It works by sending a malformed ping to a computer. 

The ping would be larger in size than what the internet protocol was made to handle. So it results in an overflow. This can cause the system to crash and potentially allow the execution of malicious code. It is when a single device is carrying out the attack. What if multiple devices are involved in the attack? It is known as Distributed Denial of Service (DDos) attack. Through this, they can take down much bigger servers.

Stay connected and updated for more! Have a happy and healthy learning.

Stay safe and Spread knowledge!!

3 thoughts on “Network Attacks

Leave a comment