SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Case Study on
COMPUTER NETWORKS
SHIVAM BAJAJ
When You have Network , You have given Access of your Social Life to that Network .
Top Network Attacks
• Ransomware - Attackers manages to get a malicious file onto
your servers with the use form of phishing . Using phishing
keystroke logging files also managed .
• IOT - It is a growing field . no. of devices are increasing and
attack on that can cause chaos on enormous scale due to
unsecured digital devices or old protocols used .
• Social Engineering - It implies deceiving someone with
purpose of acquire sensitive information , like passwords ,
credit cards . Clone Phishing is used in this
• MIM Attacks - Session Hijacking . Spoofing .
• DOS - Denial of service attack , it is malicious attempt to
make a server or network resource unavailable to users ,
usually by suspending the services of hosts .
• DDOS - Distributed Denial of Service Attack
• SQL Injection - It is an SQL code injection technique ,
used to attack data driven app , in which malicious queries
are inserted into entry field for execution .
Typical Web Application Set Up
• SSL(Secure Sockets Layer ) is protocol for establishing
encrypted links b/w server and browser .
• It is the predecessor to TLS .
• When server return pages with https links , attacker
changes them to http and when browser uses links , MITM
intercepts and creates its own https con with server
• Result MITM sees all the packets in that network .
• Using nectar and OpenSSL , 2 line proxy can be created .
• listen on 80 port on host and redirect requests to port 443.
SSL Stripping
• URL Misinterpretation - Web servers fails to parse the
URL properly . eg - Unicode/ Superflous decode attack .
• Directory Browsing - ability to retrieve complete directory
listing within directories on web server . usually happens
when default document is missing .
• Reverse proxy server - proxy that typically sits behind the
firewall in private network and direct client to backend
server and provides an additional level of abstraction .
eg Compaq Insight manager .
• Java Decompilation - Java Byte code can be decompiled
quite effectively and disclose sensitive info like password.
• Source Code Disclosure - Ability to retrieve app files in
unparsed manner and can recover code . the code then
can be used to find further loopholes/trophies.
• Input Validation - Root cause of most web attacks .
Tampering with hidden fields , Bypassing client side
checking eg javascript .
• Butter Overflows - flaw that occurs when more data is
written to buffer , can cause DOS . Application Input Fields
eg - ColdFusion Dos .
• Fragrouter - network intrusion detection evasion toolkit . It
implements Insertion , Evasion and DOS attack .
Vulnerabilities in Layers of
OSI Model .
• Physical Layer - Physical destruction , obstruction ,
manipulation or malfunction of physical assets .
• Data Link layer - Mac flooding attack inmates switch with
data packets .
• Network Layer - ICMP flooding , attacker uses ICMP
messages to overload targeted network’s bandwidth .
• Transport Layer - SYN Flood , Smurf attack .
• Session Layer - attacker exploits a flaw in server software
running on switch,rendering telnet services unavailable .
• Presentation Layer - SSL stripping & Malformed SSL
requests , to tunnel HTTP attacks to the target server .
• Application Layer - DDos attack .Get requests , HTTP GET
HTTP Post , = website forms .
Computer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptx

Weitere ähnliche Inhalte

Ähnlich wie Computer Network Case Study - bajju.pptx

Web & Cloud Security in the real world
Web & Cloud Security in the real worldWeb & Cloud Security in the real world
Web & Cloud Security in the real worldMadhu Akula
 
Security concepts
Security conceptsSecurity concepts
Security conceptsartisriva
 
Secure Android Development
Secure Android DevelopmentSecure Android Development
Secure Android DevelopmentShaul Rosenzwieg
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay aliveqqlan
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveDefconRussia
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikPositive Hack Days
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionSachintha Gunasena
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Securitypadmeshagrekar
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive MeasuresShubham Takode
 
How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)NCC Group
 
Information Security Systems
Information Security SystemsInformation Security Systems
Information Security SystemsEyad Mhanna
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network SecurityUC San Diego
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AlivePositive Hack Days
 

Ähnlich wie Computer Network Case Study - bajju.pptx (20)

Web & Cloud Security in the real world
Web & Cloud Security in the real worldWeb & Cloud Security in the real world
Web & Cloud Security in the real world
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
Secure Android Development
Secure Android DevelopmentSecure Android Development
Secure Android Development
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay alive
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay alive
 
Isys20261 lecture 09
Isys20261 lecture 09Isys20261 lecture 09
Isys20261 lecture 09
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey Gordeychik
 
Network sec 1
Network sec 1Network sec 1
Network sec 1
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive Measures
 
How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)
 
Information Security Systems
Information Security SystemsInformation Security Systems
Information Security Systems
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
Types of attack
Types of attackTypes of attack
Types of attack
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay Alive
 

Kürzlich hochgeladen

Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...Health
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksMagic Marks
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 

Kürzlich hochgeladen (20)

Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 

Computer Network Case Study - bajju.pptx

  • 1. Case Study on COMPUTER NETWORKS SHIVAM BAJAJ
  • 2. When You have Network , You have given Access of your Social Life to that Network .
  • 3. Top Network Attacks • Ransomware - Attackers manages to get a malicious file onto your servers with the use form of phishing . Using phishing keystroke logging files also managed . • IOT - It is a growing field . no. of devices are increasing and attack on that can cause chaos on enormous scale due to unsecured digital devices or old protocols used . • Social Engineering - It implies deceiving someone with purpose of acquire sensitive information , like passwords , credit cards . Clone Phishing is used in this • MIM Attacks - Session Hijacking . Spoofing .
  • 4. • DOS - Denial of service attack , it is malicious attempt to make a server or network resource unavailable to users , usually by suspending the services of hosts . • DDOS - Distributed Denial of Service Attack • SQL Injection - It is an SQL code injection technique , used to attack data driven app , in which malicious queries are inserted into entry field for execution .
  • 6. • SSL(Secure Sockets Layer ) is protocol for establishing encrypted links b/w server and browser . • It is the predecessor to TLS . • When server return pages with https links , attacker changes them to http and when browser uses links , MITM intercepts and creates its own https con with server • Result MITM sees all the packets in that network . • Using nectar and OpenSSL , 2 line proxy can be created . • listen on 80 port on host and redirect requests to port 443. SSL Stripping
  • 7. • URL Misinterpretation - Web servers fails to parse the URL properly . eg - Unicode/ Superflous decode attack . • Directory Browsing - ability to retrieve complete directory listing within directories on web server . usually happens when default document is missing . • Reverse proxy server - proxy that typically sits behind the firewall in private network and direct client to backend server and provides an additional level of abstraction . eg Compaq Insight manager . • Java Decompilation - Java Byte code can be decompiled quite effectively and disclose sensitive info like password.
  • 8. • Source Code Disclosure - Ability to retrieve app files in unparsed manner and can recover code . the code then can be used to find further loopholes/trophies. • Input Validation - Root cause of most web attacks . Tampering with hidden fields , Bypassing client side checking eg javascript . • Butter Overflows - flaw that occurs when more data is written to buffer , can cause DOS . Application Input Fields eg - ColdFusion Dos . • Fragrouter - network intrusion detection evasion toolkit . It implements Insertion , Evasion and DOS attack .
  • 9. Vulnerabilities in Layers of OSI Model .
  • 10. • Physical Layer - Physical destruction , obstruction , manipulation or malfunction of physical assets . • Data Link layer - Mac flooding attack inmates switch with data packets . • Network Layer - ICMP flooding , attacker uses ICMP messages to overload targeted network’s bandwidth . • Transport Layer - SYN Flood , Smurf attack . • Session Layer - attacker exploits a flaw in server software running on switch,rendering telnet services unavailable . • Presentation Layer - SSL stripping & Malformed SSL requests , to tunnel HTTP attacks to the target server . • Application Layer - DDos attack .Get requests , HTTP GET HTTP Post , = website forms .