Network Vulnerability and Attacks by Layer

Network Vulnerability and Attacks by Layer

Project Name: Network Vulnerability and Attacks by Layer

Description: – This article will help everyone to understand network Vulnerability and Attacks by Layer i.e. which Attack was exploited on which ISO / OSI layer. OSI model is a mapping model to acknowledge how computer networks functions and communicate. Using this ISO/OSI standard, enterprises can acknowledge where potentially network vulnerabilities exist within their network systems.

FAQ:-

  1. Network Attacks by ISO/OSI layer
  2. Network vulnerability by ISO/OSI layer

ISO/OSI Model provides a brief understanding of how the computer network operates and is categorized into different layers. In the cyber security world, threats can walk in at any point in time and any layer. In an unpredictable network, an enterprise must have a plan which addresses the threats and categorize them and enforce policies against them. Here is an honest effort to list down and categorize cyber-attacks and vulnerabilities by each layer in ISO/OSI Layer.

For detailed understanding of Protocol Usage by Each Layer follow link.

Vulnerabilities by Layer

The weakness of the system can be encountered in any of the network layers. For making the system strong against the attacks we should be educating ourselves enough about the vulnerabilities which can be impacted at each layer. Listed below are the few weaknesses which is observed on each layer.

Physical Layer:

Data/Hardware thefts, Unauthorized changes to the functional environment, Undetectable data interception, Wiretaps and reconnaissance, Open authentication, Rogue employees, and Access points

Data Link Layer: – Unauthorized joins and expansion of the network, VLAN join, Tagging and Hopping, Remote access of LAN, Topology and vulnerability discovery, Break-ins, Switch control, VLAN circumvention, spanning tree errors may be fortuitously or with intentionally introduced causing the data link layer to transmit packets in infinite loops.

Network Layer: – Guessing TCP sequence numbers, stealing existing session, No cryptography, No authentication, Works in broadcast, Unauthorized access, Route spoofing – circulate false network topology.

Transport Layer: – Three-way handshake flaws, TCP sequence number prediction, Port scan

Cyber Attack by Each Layer

To develop any kind of network model ISO/OSI guides us by categorizing it not protocol designing. This is very much similar to the blueprint one creates while building a house. Proper authorized trained staff is very essential for avoiding and minimizing the chances of threats. Educating and training as per the latest industry standards has become the need of the hour.

We have listed below all the important attacks which can happen by each ISO/OSI Layer.

Layer Cyber Attacks by Layer
Physical LayerStealing data
Data Slurping
Wiretapping
Jamming, Tempering
Bluejacking and Bluesnarfing
Physical destruction
Obstruction
Manipulation of physical assets
Data Link LayerARP poisoning
MA flooding and spoofing
Spanning-tree
Multicast brute force
Identity theft
Attacks on VLAN trunking protocol & VLAN hopping
Double-encapsulated 802.1Q/nested LAN attacks
Cast collision attack
Switch looping
VLAN hopping
STP malfunction
DHCP starvation
NDP spoofing
Network LayerSpoofing
Teardrop
Replay
Wormhole
Routing attack
Network manipulation and consumption
MITM
DoS
Cache poisoning
ICMP flooding
Smurf attack
Wormhole attacks
Sybil attack
Sinkhole attack
RIP security attack
Packet Sniffing
Back Hole/Selective Forwarding
IP Smurfing
Ping of Death
SLAAC ( Stateless Address AutoConfiguration Attack)
HSRP (Hot Standby Router Protocol) Hijacking
RIPv2, EIGRP, OSPF table poisoning
Command & Control attack
Transport LayerTCP hijacking
TCP SY flooding
UDP flooding
TCP sequence prediction attack
Smurf Attack, RIP attack
Desynchronization attack
Energy Drain attack
Session LayerSession hijacking
DNS Poisoning
Telnet / FTP sniffing
Telnet Dos Attack
MITM
Cache poisoning
DNS Redirect
Presentation LayerUnicode Vulnerabilities
SSL Stripping
SSL/TLS session sniffing
SSL Hijacking
Malformed SSL request
Application LayerBuffer Overflow
Insecure http
Randomized HTTP flood
Cache bypass HTTP flood
WordPress XML RPC flood
Business logic flaws
XSS
CSRF (Cross Site Request Forgery)
XFS (Cross Frame Scripting)
Clickjacking
Framejacking
Open Redirect
HTML, CSS inection
XSHM (Cross Site History Manipulation)
Denial-of-service attacks (DDoS)
HTTP floods
SQL injections
Cross-site scripting
Parameter tampering and Slow Loris attacks
Web cache poisoning
SSRF ( Server Side Request Forgery)
CRLF injection
Xpath injection
LDAP injection
DNS Amplification

ISO/OSI model is complex but it details out all the functions, services, and protocol in depth.

This OSI/ISO model is very important in risk assessment for any organization to work smoothly.

Today, we could see even though multiple encryption methods are used in the industry hackers are finding more and more methods to damage a system.

A strong networking mechanism with the correct identification of vulnerabilities can save a system from threats.

Core Working Areas :- Threat Intelligence, Digital Forensics, Incident Response, Fraud Investigation, Web Application Security Technical Certifications :- Computer Hacking Forensics Investigator | Certified Ethical Hacker | Certified Cyber crime investigator | Certified Professional Hacker | Certified Professional Forensics Analyst | Redhat certified Engineer | Cisco Certified Network Associates | Certified Firewall Solutions | Certified Network Monitoring Solution | Certified Proxy Solutions

Leave a Reply

Your email address will not be published. Required fields are marked *

Enter Captcha Here : *

Reload Image