Final

345 views

Published on

Published in: Education, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
345
On SlideShare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
10
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Final

  1. 3. Group Members:- <ul><li>Saisudha 05 </li></ul><ul><li>Ankita Banka 07 </li></ul><ul><li>Joveria Beg 09 </li></ul><ul><li>Tejal </li></ul><ul><li>Pooja </li></ul><ul><li>Arthy Nair 41 </li></ul>
  2. 4. <ul><li>Authentication </li></ul><ul><li>Authorization </li></ul><ul><li>Client-side Attacks </li></ul><ul><li>Command Execution </li></ul><ul><li>Information Disclosure </li></ul><ul><li>Logical Attacks </li></ul>
  3. 7. Various forms of Stealing of Password <ul><li>Password Guessing </li></ul><ul><li>Default Passwords </li></ul><ul><li>Dictionary-based Attacks </li></ul><ul><li>Brute-force Attack </li></ul><ul><li>Fake-login Programs </li></ul><ul><li>Packet-Sniffing </li></ul><ul><li>Social Engineering </li></ul>
  4. 11. It consumes the resources of a remote host or network that would otherwise be used for serving legitimate users
  5. 13. Ping of Death C:>ping 192.168.10.10 Pinging 192.168.10.10 with 32 bytes of data: Reply from 192.168.10.10: bytes=32 time=1ms TTL=150 Reply from 192.168.10.10: bytes=32 time=1ms TTL=150 Reply from 192.168.10.10: bytes=32 time=1ms TTL=150 Reply from 192.168.10.10: bytes=32 time=1ms TTL=150 Ping statistics for 192.168.10.10: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 1ms, Maximum = 1ms, Average = 1ms C:>
  6. 14. Tear Drop
  7. 15. SYN Flooding Attack
  8. 16. LAND Attack
  9. 17. Smurf Attack
  10. 18. UDP Flooding Attack
  11. 23. Forms of attack 1) Protocol failures
  12. 27. BOTNETS

×