Chooses one attacks (from different layers) below and does independent study on the chosen topics. • Prepare detailed presentation (15 min) with power point slides • Describe the attack and the prevention
• Chooses one attacks (from different layers) below and does independent study on the chosen topics.
• Prepare detailed presentation (15 min) with power point slides
• Describe the attack and the prevention (or detection or mitigation) methods
• Please create original diagrams with Visio, http://draw.io, etc..
• All diagrams should be explained.
• This project is technical presentation which should be created in PowerPoint. Select a type of attack outlined in project description.
• Select an attack topic and build a presentation which will contain the following:
• How is the attack launched is it perpetrated by tools, social engineering, scripts, etc.. ?
• What type of target this attacks pinpoints switches, routers, etc..?
• What measures can be taken by an organization to stop the attacks such tools, device, etc.. ?
• Please provide background and statistics regarding the attack.
• Please site all resource utilized in APA format
• https://apastyle.apa.org/ (utilize PDF for explanation)
1. The port scanning or port enumeration techniques attacks
• SCTP Cookie Echo Scan
• Spear-phishing
• Banner grabbing
• Web-based Directory Enumeration Attack
• FTP bounce scanning
• ARP (Address Resolution Protocol) scan
• Vanilla attack
• SNMP Enumeration
2. Layer 2 attacks or lower layer attacks
• VLAN hopping,
• MAC address spoofing, MAC flooding
• Spanning-Tree Attack
• Jamming Attack
• Vulnerability on Neighbor Discovery Protocol (NDP)
• GARP Attacks/ARP poisoning
• Private VLAN Proxy Attack
• MAC flooding, MAC spoofing and ARP flood attacks
• Authentication/Association flood attack and deauthentication/disassociation
flood attack ----
3. Layer 3 (or Router) attacks
• DNS Rebinding and Route Table Poisoning
• Cross-Site Request Forgery (CSRF)
• Max Sequence Number Attack via OSPF
• BGP Router Attacks
• RIP Attack
• Heap and Stack Overflow Attacks
• DHCP Starvation/ DHCP Consumption Attack/DHCP Exhaustion Attack
• Peer-to-Peer and Smurf attacks
• Routing Table Modification and Denial of Service Attacks
• Denial of Service Attacks- SYN Floods
• OSPF and XSS attacks