Attack Types: Difference between revisions

From
Jump to navigation Jump to search
No edit summary
No edit summary
 
(12 intermediate revisions by 3 users not shown)
Line 1: Line 1:
The spectrum of attacks is very broad. Different attacks often have overlapping aspects while at the same time are totally different in others. It is therefore a tedious work to list them all. To seperate them nevertheless an attack is usually divided into basic schemes that are used over and over again. Although one scheme alone is not very powerful, they can be combined to create a perfect attack that will smash the world into pieces and make you the ruler of the world *harharhar*. Some of these are presented here. There are a lot more techniques used that are not presented here.
[Right now, this topic is just a list of correlated topics. But that will change soon.]


*[[Vulnerabilities|Preface: Vulnerabilities]]
*[[Spoofing]]
*[[Spoofing]]
*[[Man in the Middle]]
*[[Man in the Middle]]
*[[Denial of Service]]
*[[Denial of Service]] ([[DoS]])
*[[Distributed Denial of Service]]
*[[Distributed Denial of Service]] ([[DDoS]])
*[[Botnet|Botnets]]
*[[Botnet|Botnets]]
*[[Social Engineering]]
*[[Social Engineering]]

== Literature ==

*Russell, Cunningham: ''Maximum Protection'', MITP-Verlag Bonn, 2001, ISBN: 9783826606878
*Eckert: ''IT-Sicherheit'', Oldenbourg Verlag München Wien, 2003, ISBN: 3486272055
*Cheswick, Bellovin, Rubin: ''Firewalls und Sicherheit im Internet'', Addison-Wesley, 2004, ISBN: 9827321174

== Links ==
*[http://www.denialinfo.com/ Denial of Service (DoS) Attack Resources]
*[http://www.cert.org/advisories/CA-1998-01.html CERT advisory on Smurf DoS attacks]
*[http://www.pentics.net/denial-of-service/white-papers/smurf.cgi "Smurfing" description and information to minimize effects]

Latest revision as of 11:25, 30 January 2005

The spectrum of attacks is very broad. Different attacks often have overlapping aspects while at the same time are totally different in others. It is therefore a tedious work to list them all. To seperate them nevertheless an attack is usually divided into basic schemes that are used over and over again. Although one scheme alone is not very powerful, they can be combined to create a perfect attack that will smash the world into pieces and make you the ruler of the world *harharhar*. Some of these are presented here. There are a lot more techniques used that are not presented here.

Literature

  • Russell, Cunningham: Maximum Protection, MITP-Verlag Bonn, 2001, ISBN: 9783826606878
  • Eckert: IT-Sicherheit, Oldenbourg Verlag München Wien, 2003, ISBN: 3486272055
  • Cheswick, Bellovin, Rubin: Firewalls und Sicherheit im Internet, Addison-Wesley, 2004, ISBN: 9827321174

Links