Notice: This page requires JavaScript to function properly.
Please enable JavaScript in your browser settings or update your browser.
Aprenda Examples of Cyber Attacks | Web Cyber Security
Cybersecurity Fundamentals

bookExamples of Cyber Attacks

Now we will consider some examples of cyber attacks that can be performed on different OSI model layers.

Layer 1 (Physical Layer)

Evil Twin Attacks: Attackers set up a rogue Wi-Fi hotspot with a similar name to a legitimate network to trick users into connecting.

Layer 2 (Data Link Layer):

ARP Spoofing/Poisoning: Attackers send false Address Resolution Protocol (ARP) messages to associate their MAC address with the IP address of a legitimate device.

Layer 3 (Network Layer):

IP Spoofing: Attackers send IP packets from a false (or "spoofed") source address to deceive the recipient about the origin of the message.

Layer 4 (Transport Layer):

  • Man-in-the-Middle (MitM) Attacks: Attackers intercept and manipulate communication between two parties, often by eavesdropping or altering data in transit;
  • Session Hijacking: Attackers steal session cookies or tokens to impersonate a user.

Layer 7 (Application Layer):

  • SQL Injection: Attackers inject malicious SQL code into input fields, exploiting vulnerabilities in the application's database layer;
  • Cross-Site Scripting (XSS): Malicious scripts are injected into web pages viewed by other users, typically through user inputs or unvalidated data;
  • Cross-Site Request Forgery (CSRF): Unauthorized commands are transmitted from a user the web application trusts.
question mark

What is the primary focus of ARP Spoofing/Poisoning attacks, and at which OSI layer do they occur?

Select the correct answer

Tudo estava claro?

Como podemos melhorá-lo?

Obrigado pelo seu feedback!

Seção 2. Capítulo 4

Pergunte à IA

expand

Pergunte à IA

ChatGPT

Pergunte o que quiser ou experimente uma das perguntas sugeridas para iniciar nosso bate-papo

Awesome!

Completion rate improved to 5

bookExamples of Cyber Attacks

Deslize para mostrar o menu

Now we will consider some examples of cyber attacks that can be performed on different OSI model layers.

Layer 1 (Physical Layer)

Evil Twin Attacks: Attackers set up a rogue Wi-Fi hotspot with a similar name to a legitimate network to trick users into connecting.

Layer 2 (Data Link Layer):

ARP Spoofing/Poisoning: Attackers send false Address Resolution Protocol (ARP) messages to associate their MAC address with the IP address of a legitimate device.

Layer 3 (Network Layer):

IP Spoofing: Attackers send IP packets from a false (or "spoofed") source address to deceive the recipient about the origin of the message.

Layer 4 (Transport Layer):

  • Man-in-the-Middle (MitM) Attacks: Attackers intercept and manipulate communication between two parties, often by eavesdropping or altering data in transit;
  • Session Hijacking: Attackers steal session cookies or tokens to impersonate a user.

Layer 7 (Application Layer):

  • SQL Injection: Attackers inject malicious SQL code into input fields, exploiting vulnerabilities in the application's database layer;
  • Cross-Site Scripting (XSS): Malicious scripts are injected into web pages viewed by other users, typically through user inputs or unvalidated data;
  • Cross-Site Request Forgery (CSRF): Unauthorized commands are transmitted from a user the web application trusts.
question mark

What is the primary focus of ARP Spoofing/Poisoning attacks, and at which OSI layer do they occur?

Select the correct answer

Tudo estava claro?

Como podemos melhorá-lo?

Obrigado pelo seu feedback!

Seção 2. Capítulo 4
some-alt