The University Of Arizon Electrical And Computer Engineering
7879 Words32 Pages
The University of Arizona
Electrical and Computer Engineering
Name: Alain CIZUNGU BAZIBUHE
Homework No 1.
Question I: list of attacks: Rogue Wi-Fi, Homograph, Tabnabing, Evil Twins, Smurf, Ping Flood, SYN Flood, Teardrop, Peer-to-Peer Attack, Banana Attack, NUKE Attack, R-U-Dead-Yet attack, Slammer Worm, MyDoom, DRDOS Attack, Advanced Persistent DoS (APDoS), Stuxnet, Crypto Locker, SQL Injection, Persistent XSS attacks, DOM-based XSS.
a. Describe briefly the attack and how it works.
b. Apply the two attack classification techniques discussed in the class for each attack in the list.
I.1 Rogue WIFI attack
Airtight Network blogs describe the rogue AP as an unmanaged AP plugged into wired enterprise network by unwilling or…show more content… Their incorrect usage is a possibility for security attacks
According to Wikipedia notes, Aza Raskin is a security researcher and design expert who coined the Tabnabing attack earlier in 2010. This computer exploit and phishing attack, persuades users to submit their login details and passwords to popular websites by impersonating those sites and convincing the user that the site is genuine. The attack takes advantage on users trust and inattention to detail in regard to tabs and ability of modern web pages to rewrite tabs and their contents a long time after the page is loaded. The other phishing attacks will ask you to click on an obfuscated link but the tabnabing work differently because it will just load a fake page in one of the most opened page in your browser.
I.4. Evil twin
Wikipedia describes an evil twin as a type of Wi-Fi attack, similar in nature to Web site spoofing and e-mail phishing attacks.
Here 's how an evil twin attack works:
A hacker sets its service identifier (SID) to be the same as an access point at the local hotspot or corporate wireless network.
The hacker disrupts or disables the legitimate AP by disconnecting it, directing a denial of service against it, or creating RF interference around it.
Users lose their connections to