SlideShare a Scribd company logo
1 of 12
Case Study on
COMPUTER NETWORKS
SHIVAM BAJAJ
When You have Network , You have given Access of your Social Life to that Network .
Top Network Attacks
• Ransomware - Attackers manages to get a malicious file onto
your servers with the use form of phishing . Using phishing
keystroke logging files also managed .
• IOT - It is a growing field . no. of devices are increasing and
attack on that can cause chaos on enormous scale due to
unsecured digital devices or old protocols used .
• Social Engineering - It implies deceiving someone with
purpose of acquire sensitive information , like passwords ,
credit cards . Clone Phishing is used in this
• MIM Attacks - Session Hijacking . Spoofing .
• DOS - Denial of service attack , it is malicious attempt to
make a server or network resource unavailable to users ,
usually by suspending the services of hosts .
• DDOS - Distributed Denial of Service Attack
• SQL Injection - It is an SQL code injection technique ,
used to attack data driven app , in which malicious queries
are inserted into entry field for execution .
Typical Web Application Set Up
• SSL(Secure Sockets Layer ) is protocol for establishing
encrypted links b/w server and browser .
• It is the predecessor to TLS .
• When server return pages with https links , attacker
changes them to http and when browser uses links , MITM
intercepts and creates its own https con with server
• Result MITM sees all the packets in that network .
• Using nectar and OpenSSL , 2 line proxy can be created .
• listen on 80 port on host and redirect requests to port 443.
SSL Stripping
• URL Misinterpretation - Web servers fails to parse the
URL properly . eg - Unicode/ Superflous decode attack .
• Directory Browsing - ability to retrieve complete directory
listing within directories on web server . usually happens
when default document is missing .
• Reverse proxy server - proxy that typically sits behind the
firewall in private network and direct client to backend
server and provides an additional level of abstraction .
eg Compaq Insight manager .
• Java Decompilation - Java Byte code can be decompiled
quite effectively and disclose sensitive info like password.
• Source Code Disclosure - Ability to retrieve app files in
unparsed manner and can recover code . the code then
can be used to find further loopholes/trophies.
• Input Validation - Root cause of most web attacks .
Tampering with hidden fields , Bypassing client side
checking eg javascript .
• Butter Overflows - flaw that occurs when more data is
written to buffer , can cause DOS . Application Input Fields
eg - ColdFusion Dos .
• Fragrouter - network intrusion detection evasion toolkit . It
implements Insertion , Evasion and DOS attack .
Vulnerabilities in Layers of
OSI Model .
• Physical Layer - Physical destruction , obstruction ,
manipulation or malfunction of physical assets .
• Data Link layer - Mac flooding attack inmates switch with
data packets .
• Network Layer - ICMP flooding , attacker uses ICMP
messages to overload targeted network’s bandwidth .
• Transport Layer - SYN Flood , Smurf attack .
• Session Layer - attacker exploits a flaw in server software
running on switch,rendering telnet services unavailable .
• Presentation Layer - SSL stripping & Malformed SSL
requests , to tunnel HTTP attacks to the target server .
• Application Layer - DDos attack .Get requests , HTTP GET
HTTP Post , = website forms .
Computer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptx

More Related Content

Similar to Computer Network Case Study - bajju.pptx

Web & Cloud Security in the real world
Web & Cloud Security in the real worldWeb & Cloud Security in the real world
Web & Cloud Security in the real worldMadhu Akula
 
Security concepts
Security conceptsSecurity concepts
Security conceptsartisriva
 
Secure Android Development
Secure Android DevelopmentSecure Android Development
Secure Android DevelopmentShaul Rosenzwieg
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay aliveqqlan
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveDefconRussia
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikPositive Hack Days
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionSachintha Gunasena
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Securitypadmeshagrekar
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive MeasuresShubham Takode
 
How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)NCC Group
 
Information Security Systems
Information Security SystemsInformation Security Systems
Information Security SystemsEyad Mhanna
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network SecurityUC San Diego
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AlivePositive Hack Days
 

Similar to Computer Network Case Study - bajju.pptx (20)

Web & Cloud Security in the real world
Web & Cloud Security in the real worldWeb & Cloud Security in the real world
Web & Cloud Security in the real world
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
Secure Android Development
Secure Android DevelopmentSecure Android Development
Secure Android Development
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay alive
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay alive
 
Isys20261 lecture 09
Isys20261 lecture 09Isys20261 lecture 09
Isys20261 lecture 09
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey Gordeychik
 
Network sec 1
Network sec 1Network sec 1
Network sec 1
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive Measures
 
How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)How we breach small and medium enterprises (SMEs)
How we breach small and medium enterprises (SMEs)
 
Information Security Systems
Information Security SystemsInformation Security Systems
Information Security Systems
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
Types of attack
Types of attackTypes of attack
Types of attack
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay Alive
 

Recently uploaded

Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfsmsksolar
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxnuruddin69
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 

Recently uploaded (20)

Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 

Computer Network Case Study - bajju.pptx

  • 1. Case Study on COMPUTER NETWORKS SHIVAM BAJAJ
  • 2. When You have Network , You have given Access of your Social Life to that Network .
  • 3. Top Network Attacks • Ransomware - Attackers manages to get a malicious file onto your servers with the use form of phishing . Using phishing keystroke logging files also managed . • IOT - It is a growing field . no. of devices are increasing and attack on that can cause chaos on enormous scale due to unsecured digital devices or old protocols used . • Social Engineering - It implies deceiving someone with purpose of acquire sensitive information , like passwords , credit cards . Clone Phishing is used in this • MIM Attacks - Session Hijacking . Spoofing .
  • 4. • DOS - Denial of service attack , it is malicious attempt to make a server or network resource unavailable to users , usually by suspending the services of hosts . • DDOS - Distributed Denial of Service Attack • SQL Injection - It is an SQL code injection technique , used to attack data driven app , in which malicious queries are inserted into entry field for execution .
  • 6. • SSL(Secure Sockets Layer ) is protocol for establishing encrypted links b/w server and browser . • It is the predecessor to TLS . • When server return pages with https links , attacker changes them to http and when browser uses links , MITM intercepts and creates its own https con with server • Result MITM sees all the packets in that network . • Using nectar and OpenSSL , 2 line proxy can be created . • listen on 80 port on host and redirect requests to port 443. SSL Stripping
  • 7. • URL Misinterpretation - Web servers fails to parse the URL properly . eg - Unicode/ Superflous decode attack . • Directory Browsing - ability to retrieve complete directory listing within directories on web server . usually happens when default document is missing . • Reverse proxy server - proxy that typically sits behind the firewall in private network and direct client to backend server and provides an additional level of abstraction . eg Compaq Insight manager . • Java Decompilation - Java Byte code can be decompiled quite effectively and disclose sensitive info like password.
  • 8. • Source Code Disclosure - Ability to retrieve app files in unparsed manner and can recover code . the code then can be used to find further loopholes/trophies. • Input Validation - Root cause of most web attacks . Tampering with hidden fields , Bypassing client side checking eg javascript . • Butter Overflows - flaw that occurs when more data is written to buffer , can cause DOS . Application Input Fields eg - ColdFusion Dos . • Fragrouter - network intrusion detection evasion toolkit . It implements Insertion , Evasion and DOS attack .
  • 9. Vulnerabilities in Layers of OSI Model .
  • 10. • Physical Layer - Physical destruction , obstruction , manipulation or malfunction of physical assets . • Data Link layer - Mac flooding attack inmates switch with data packets . • Network Layer - ICMP flooding , attacker uses ICMP messages to overload targeted network’s bandwidth . • Transport Layer - SYN Flood , Smurf attack . • Session Layer - attacker exploits a flaw in server software running on switch,rendering telnet services unavailable . • Presentation Layer - SSL stripping & Malformed SSL requests , to tunnel HTTP attacks to the target server . • Application Layer - DDos attack .Get requests , HTTP GET HTTP Post , = website forms .