Please enable JavaScript.
Coggle requires JavaScript to display documents.
NETWORK ATACKS, image, image, image, image, image, image, image - Coggle…
NETWORK ATACKS
Types of Malware
Viruses: Un virus o virus informático es un software que tiene por objetivo alterar el funcionamiento normal de cualquier tipo de dispositivo informático
-
Trojan Horses: a un malware que se presenta al usuario como un programa aparentemente legítimo e inofensivo, pero que, al ejecutarlo, le brinda a un atacante acceso remoto al equipo infectado.
Reconnaissance Attacks
Reconnaissance attacks - The discovery and mapping of systems, services, or vulnerabilities.
Access attacks - The unauthorized manipulation of data, system access, or user privileges.
Denial of service - The disabling or corruption of networks, systems, or services.
Access Attacks
-
Trust Exploitation
In a trust exploitation attack, a threat actor uses unauthorized privileges to gain access to a system, possibly compromising the target. Click Play in the figure to view an example of trust exploitation.
Port Redirection
A threat actor uses a compromised system as a base for attacks against other targets. The example in the figure shows a threat actor using SSH (port 22) to connect to a compromised host A. Host A is trusted by host B and, therefore, the threat actor can use Telnet (port 23) to access it.
Man-in-the-Middle
In a man-in-the-middle attack, the threat actor is positioned in between two legitimate entities in order to read or modify the data that passes between the two parties. The figure displays an example of a man-in-the-middle attack.
-
-
-
-
-
-
-
-