Chapter 7. Classifying Sophisticated Network Attacks
This chapter covers the following topics:
- IP Spoofing
- Packet Sniffers
- Password Attacks
- Man-In-The-Middle Attacks
- Port Redirection
- Virus and Trojan-Horse Applications
This chapter continues the analysis of various network attacks introduced in Chapter 6, "Classifying Rudimentary Network Attacks." Many of the attacks covered in this chapter typically require that the attacker have software skills that are more advanced than the skills needed to execute the attacks described in Chapter 6. The attacks covered in this chapter include IP spoofing attacks, traffic sniffing, password attacks, man-in-the-middle attacks, port redirection, and virus and Trojan-horse applications.Some of the attacks covered in this chapter cannot be executed effectively unless the attacker has access to a system on a network. Other attacks, such as IP spoofing, port redirection, and man-in-the-middle attacks, do not require such access but do require additional skill on the part of the attacker in order to be successfully executed. The intent, however, is the same as the attacks covered in the previous chapter: to gain access to a system or network.