What is cyberattacks?
Model OSI. Typical cyberattacks.
Session Layer. Attacks and methods of protection.
Presentation Layer. Attacks and methods of protection.
Application Layer. Attacks and methods of protection.
Examples.
A cyberattack is any malicious attempt to gain unauthorized access, disrupt, modify, destroy, or steal data or systems within a computer network using digital technology.
It can be:
Active: aimed at altering system resources or affecting their operation (e.g., DDoS, data modification).
Passive: aimed at unauthorized eavesdropping or information gathering without altering resources (e.g., network traffic sniffing, port scanning).
Physical
Data Link
Network
Transport
Session
Presentation
Application
SQL Injection, XSS (Cross-Site Scripting), Phishing, Code vulnerabilities, DDoS
Man-in-the-middle attacks (MITM), Data manipulation
Session Hijacking, Sockets port attacks, Improper session termination
SYN Flood, Port Scanning
IP Spoofing, Attacks on routing protocols, MITM
ARP Spoofing, MAC Spoofing, MAC Flooding
Eavesdropping, Sabotage, Signal Jamming
This layer is protected through secure session management.
This level is protected through strong encryption.
DDoS - Rate Limiting, Blackholing.
Developer tools -> Validation
disabled, required, checked
XSS
XSS -> Frame
XSS
<scri<script type="text/javascript">pt>
document.write ('<table width="100%" border="1">');
for (i=1; i<6; i++)
{ document.writeln("<tr>"); for (j=1; j<6; j++)
document.write("<td>" + i + j + "<\/td>"); document.writeln("<\/tr>"); }
document.write ("<\/table> ");
</scri</script>pt>SQL injection
SELECT * FROM users WHERE email = '${email}';
r1pm@gmail.com'; DELETE FROM users; --
SELECT * FROM users WHERE email = 'r1pm@gmail.com'; DELETE FROM users; --';SELECT * FROM users WHERE username = '${username}' AND password = '${password}';
' OR '1' = '1
SELECT * FROM users WHERE username = 'ruslan' AND password = '' OR '1' = '1';SE/*comment*/LECT
SeLeCt
Fishing