chapter 5: attack

Get Started. It's Free
or sign up with your email address
chapter 5: attack by Mind Map: chapter 5: attack

1. SMURF ATTACK

1.1. A smurf attack is a type of denial of service attack in which a system is flooded with spoofed ping messages.

2. SYN FLOOD ATTACK

2.1. In a SYN Flood attack, a victim server or firewall receives SYN packets at very high packet rates that can overwhelm the victim by consuming its resources.

3. SESSION HIJACKING ATTACK

3.1. Session hijacking occurs when a session token is sent to a client browser from the Web server following the successful authentication of a client logon. A session hijacking attack works when it compromises the token by either confiscating or guessing what an authentic token session will be, thus acquiring unauthorized access to the Web server.

4. SQL injection

4.1. is a type of security exploit in which the attacker adds Structured Query Language (SQL) code to a Web form input box to gain access to resources

5. COOKIE POISONING AND SNOOPING

5.1. Cookie Poisoning attacks involve the modification of the contents of a cookie (personal information stored in a Web user's computer) in order to bypass security