Please enable JavaScript.
Coggle requires JavaScript to display documents.
Attacking the Foundation, IP PDU Details, 1000082831, images (2), images…
Attacking the Foundation
IP Vulnerabilities
IP Vulnerabilities
There are different types of attacks that target IP.
ICMP attacks
Denial-of-Service (DoS) attacks
Distributed Denial-of-Service (DDoS) attacks
Address spoofing attacks
Man-in-the-middle attack (MiTM)
Session hijacking
-
Address Spoofing Attacks
IP address spoofing attacks occur when a threat actor creates packets with false source IP address information to either hide the identity of the sender, or to pose as another legitimate user. The threat actor can then gain access to otherwise inaccessible data or circumvent security configurations. Spoofing is usually incorporated into another attack such as a Smurf attack.
ICMP Attacks
ICMP was developed to carry diagnostic messages and to report error conditions when routes, hosts, and ports are unavailable. ICMP messages are generated by devices when a network error or outage occurs.
-
IP PDU Details
IPv4 and IPv6
IP was designed as a Layer 3 connectionless protocol. It provides the necessary functions to deliver a packet from a source host to a destination host over an interconnected system of networks. The protocol was not designed to track and manage the flow of packets. These functions, if required, are performed primarily by TCP at Layer 4.
The IPv4 Packet Header
This is a field that varies in length from 0 to a multiple of 32 bits.
If the option values are not a multiple of 32 bits, 0s are added, or padded, to ensure that this field contains a multiple of 32 bits.
The IPv6 Packet Header
An IPv6 packet may also contain extension headers (EH) that provide optional network layer information. Extension headers are optional and are placed between the IPv6 header and the payload. EHs are used for fragmentation, security, to support mobility, and more.
Unlike IPv4, routers do not fragment routed IPv6 packets.
-
-
-
-
-
-
-
-
-
-
-
-