Please enable JavaScript.
Coggle requires JavaScript to display documents.
ATTACKS (primary classes of attacks exist:- (Reconnaissance (Steps to…
ATTACKS
primary classes of attacks exist:-
Reconnaissance
The unauthorized discovery and mapping of systems, services, or vulnerabilities.
It is also known as information gathering and, in most cases, it precedes an actual access or denial-of-service (DoS) attack.
Reconnaissance is somewhat analogous to a thief casing a neighborhood for vulnerable homes to break into, such as an unoccupied residence, easy-to-open doors, or open windows.
Attack consist of the following:-
Packet sniffers
Port scans
Ping sweeps
Internet information queries
Steps to attacks:-
A malicious intruder typically ping sweeps the target network to determine which IP addresses are alive.
After this, the intruder uses a port scanner, to determine what network services or ports are active on the live IP addresses.
From this information, the intruder queries the ports to determine the application type and version, and the type and version of operating system running on the target host.
Based on this information, the intruder can determine whether a possible vulnerability exists that can be exploited.
Example:- eavesdropping
Access
Denial of service (DoS)
Malicious code (worms, viruses, trojan horses)