logo

GNS3 Simulation - Networking

9 Pages565 Words52 Views
   

Added on  2023-01-19

About This Document

This document provides an overview of denial of service attacks, SQL injection, ARP spoofing, and dictionary attacks. It also includes a GNS3 simulation for router, switch, hub, and PC configurations.

GNS3 Simulation - Networking

   Added on 2023-01-19

ShareRelated Documents
University
Semester
GNS3 SIMULATION - NETWORKING
Student ID
Student Name
Submission Date
1
GNS3 Simulation - Networking_1
Table of Contents
1. Denial of Service Attacks – HTTPS...................................................................................3
1.1 SQL Injection..............................................................................................................3
1.2 ARP spoofing..............................................................................................................3
2. Dictionary Attacks..............................................................................................................4
3. GNS 3 Simulation...............................................................................................................4
2
GNS3 Simulation - Networking_2
1. Denial of Service Attacks – HTTPS
A denial-of-service (DoS) attack is a type of cyber attack in which a malicious actor
aims to render a computer or other device unavailable to its intended users by interrupting the
device's normal functioning. DoS attacks typically function by overwhelming or flooding a
targeted machine with requests until normal traffic is unable to be processed, resulting in
denial-of-service to addition users. A DoS attack is characterized by using a single computer
to launch the attack.
Content will be added.
1.1 SQL Injection
SQL Injection is a type of an injection attack that makes it possible to execute malicious
SQL statements. These statements control a database server behind a web application.
Attackers can use SQL Injection vulnerabilities to bypass application security measures. They
can go around authentication and authorization of a web page or web application and retrieve
the content of the entire SQL database. They can also use SQL Injection to add, modify, and
delete records in the database.
SQL Injection vulnerability may affect any website or web application that uses an SQL
database such as MySQL, Oracle, SQL Server, or others. Criminals may use it to gain
unauthorized access to your sensitive data: customer information, personal data, trade secrets,
intellectual property, and more. SQL Injection attacks are one of the oldest, most prevalent,
and most dangerous web application vulnerabilities.
Content will be added.
1.2 ARP spoofing
ARP spoofing is a type of attack in which a malicious actor sends falsified ARP
(Address Resolution Protocol) messages over a local area network. This results in the linking
of an attacker’s MAC address with the IP address of a legitimate computer or server on the
network. Once the attacker’s MAC address is connected to an authentic IP address, the
attacker will begin receiving any data that is intended for that IP address. ARP spoofing can
enable malicious parties to intercept, modify or even stop data in-transit. ARP spoofing
attacks can only occur on local area networks that utilize the Address Resolution Protocol.
Content will be added.
3
GNS3 Simulation - Networking_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Contemporary World Application 2022
|10
|541
|10

Man-In-The-Middle Attack
|18
|3456
|309

Introduction to Kali Linux
|18
|683
|42

Analysis of Security Vulnerability of WidgetsInc Virtual Machine Image
|23
|3636
|97

Ethical Hacking & Countermeasures Report 2022
|25
|3747
|46

Wireless Network Vulnerabilities and Security Measures - Desklib
|7
|1988
|258