SlideShare a Scribd company logo
A summary of
types of attacks II.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Sniffer and password attacks.
– Social engineering attacks.
PACE-IT.
Page 4
A summary of types of attacks II.
Page 5
Quite often, an attacker
(hacker) will use a sniffer
type attack in order to
determine what type of
attack to use on a network.
Sniffer attacks use specialized software to examine the network
for vulnerabilities. That software may conduct a port scan—
looking for either open or vulnerable ports that can be exploited.
Or, the software may be used to examine network packets in
order to determine what applications, protocols, and services are
in use on the network.
A common port scanning attack is the XMAS scan. With the
XMAS scan, each packet sent by the scanner has three of the six
possible flags set (so it is lit up like a Christmas tree) in order to
keep the scan from being discovered.
A summary of types of attacks II.
Page 6
Unfortunately, end user
passwords often present an
attacker with an easy entry
into the network.
Even when network administers try to create a
strong password policy, end users often attempt to
create easy to remember passwords. Usually, if the
password is easy to remember, it is easy to crack.
In studies conducted on passwords, some of the
most common include: 12345678, password, qwerty
and letmein. These do not represent much of a
challenge to the hacker. Attackers also have other
tools that they can use in a password attack.
A summary of types of attacks II.
Page 7
– Types of password attacks.
» Dictionary attack: the attacker uses a specialized
software that contains a list of the most popular
usernames and a list of all of the words in a language.
• The program runs through all of the possible
combinations in an attempt to find one that works.
» Brute force attack: an attacker uses a password
cracking application that mathematically calculates every
possible password combination.
• Takes a large amount of computing power and time in
order to be successful.
• A rainbow table may speed up the process. It contains
a list of all of the possible characters and combinations
that can be used to create a password.
» Hybrid attack: uses a combination of the dictionary
attack and the brute force attack.
» Birthday attack: an attempt to duplicate a hashed value
that is used to authenticate a user or system.
• The attacker uses a program that hashes data in an
effort to recreate a known hashed value; if enough data
is input, eventually the hashed value will be duplicated.
A summary of types of attacks II.
Page 8
A summary of types of attacks II.
Page 9
– Phishing attack.
» The hacker typically casts out a broad net of emails that appear
to be from a trusted source (e.g., a well known bank or Google)
that requests that the user click on a hyperlink.
• The hyperlink connects to a malicious website and, when the
user inputs his or her credentials (as requested), the attacker
then steals the user’s credentials.
» Spear phishing attacks are similar to phishing attacks, but
more directed.
• The hacker’s email appears to come from an even more
trusted source (e.g., from management or a trusted
coworker).
– Pharming attack.
» The attacker uses DNS poisoning to redirect traffic from
legitimate sites to a different or malicious site.
– Vishing.
» Using the telephone to perform a phishing attack.
• The attacker impersonates a trusted source (or attempts to
impersonate a trusted source).
A summary of types of attacks II.
Page 10
A summary of types of attacks II.
Hackers will often use a sniffer type attack when attempting to determine
what other type of attack will work against a network. Sniffer attacks can
scan networks for open ports and vulnerabilities. A common port scanning
attack is the XMAS scan. Passwords often represent a vulnerability to
network security. Hackers may use dictionary, brute force, or hybrid attacks
in an attempt to crack passwords. Birthday attacks attempt to duplicate a
hashed value that is used for authentication.
Topic
Sniffer and password attacks.
Summary
Over the years, social engineering attacks have proven to be a successful
avenue for hackers to use. Some of the methods used for social
engineering attacks include: phishing, spear phishing, pharming, and
vishing.
Social engineering attacks.
Page 11
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

What's hot (19)

PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security + 5.1: Summary of Authentication Services
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
Pace IT at Edmonds Community College
 
PPT
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
UISGCON
 
PDF
Webinar - Reducing Your Cybersecurity Risk
WPICPE
 
PDF
Hacking the Helpdesk: Social Engineering Risks
Craig Clark ITIL, CIS LI,EU GDPR P
 
PDF
Cyber Attack Analysis : Part I DDoS
Kenny Huang Ph.D.
 
PDF
Chapter 2 konsep dasar keamanan
newbie2019
 
PDF
Chapter 4 vulnerability threat and attack
newbie2019
 
PDF
Chapter 2 konsep dasar keamanan
newbie2019
 
PDF
How to analyze cyber threats
AkankshaPathak27
 
PPT
Mark Arena - Cyber Threat Intelligence #uisgcon9
UISGCON
 
PDF
E Commerce security
Mayank Kashyap
 
PPT
Security in e-commerce
SensePost
 
PPTX
Vapt life cycle
penetration Tester
 
PPTX
Cyber security
Eduonix
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.1: Summary of Authentication Services
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.3: Security Controls for Account Management
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
Pace IT at Edmonds Community College
 
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
UISGCON
 
Webinar - Reducing Your Cybersecurity Risk
WPICPE
 
Hacking the Helpdesk: Social Engineering Risks
Craig Clark ITIL, CIS LI,EU GDPR P
 
Cyber Attack Analysis : Part I DDoS
Kenny Huang Ph.D.
 
Chapter 2 konsep dasar keamanan
newbie2019
 
Chapter 4 vulnerability threat and attack
newbie2019
 
Chapter 2 konsep dasar keamanan
newbie2019
 
How to analyze cyber threats
AkankshaPathak27
 
Mark Arena - Cyber Threat Intelligence #uisgcon9
UISGCON
 
E Commerce security
Mayank Kashyap
 
Security in e-commerce
SensePost
 
Vapt life cycle
penetration Tester
 
Cyber security
Eduonix
 

Viewers also liked (14)

PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.6: Security Enhancement Techniques
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.4: Summary of Wireless Attacks
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
PPTX
PACE-IT, Security+3.1: Types of Malware
Pace IT at Edmonds Community College
 
PPTX
Cloud Computing
Talal Alsubaie
 
PPTX
PACE-IT, Security+2.9: Goals of Security Controls
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.6: Security Enhancement Techniques
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.1: Types of Malware
Pace IT at Edmonds Community College
 
Cloud Computing
Talal Alsubaie
 
PACE-IT, Security+2.9: Goals of Security Controls
Pace IT at Edmonds Community College
 
Ad

Similar to PACE-IT, Security+3.2: Summary of Types of Attacks (part 2) (20)

PPTX
Cybersecurity
A. Shamel
 
PDF
Network security
Md. Asifur Rahman Siddiki
 
PPTX
Protection from hacking attacks
Sugirtha Jasmine M
 
PPTX
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Eric Vanderburg
 
PPTX
Lec 2- Hardening and whitelisting of devices
BilalMehmood44
 
PDF
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
CyberPro Magazine
 
PPT
Meletis Belsis - Introduction to information security
Meletis Belsis MPhil/MRes/BSc
 
PDF
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
Cyber security professional services- Detox techno
 
PPTX
Cyber attack
Manjushree Mashal
 
PDF
Cyber attacks
Anuradha Moti T
 
PDF
1 ijaems sept-2015-3-different attacks in the network a review
INFOGAIN PUBLICATION
 
PPTX
Types of attacks in cyber security
Bansari Shah
 
PPT
Cyber security and detailed informat.ppt
raga04269
 
PPTX
module 3 of cybersecurity of first year students
MayuraD1
 
PDF
Ethical Hacking and Cyber Security
Neeraj Negi
 
PDF
Sip 140208055023-phpapp02
mark scott
 
PPTX
Ethical Hacking
Lalit Kumar
 
PPT
Hacking Presentation
Animesh Behera
 
PPT
Complete notes security
Kitkat Emoo
 
PPTX
Internet security powerpoint
Arifa Ali
 
Cybersecurity
A. Shamel
 
Network security
Md. Asifur Rahman Siddiki
 
Protection from hacking attacks
Sugirtha Jasmine M
 
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Eric Vanderburg
 
Lec 2- Hardening and whitelisting of devices
BilalMehmood44
 
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
CyberPro Magazine
 
Meletis Belsis - Introduction to information security
Meletis Belsis MPhil/MRes/BSc
 
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
Cyber security professional services- Detox techno
 
Cyber attack
Manjushree Mashal
 
Cyber attacks
Anuradha Moti T
 
1 ijaems sept-2015-3-different attacks in the network a review
INFOGAIN PUBLICATION
 
Types of attacks in cyber security
Bansari Shah
 
Cyber security and detailed informat.ppt
raga04269
 
module 3 of cybersecurity of first year students
MayuraD1
 
Ethical Hacking and Cyber Security
Neeraj Negi
 
Sip 140208055023-phpapp02
mark scott
 
Ethical Hacking
Lalit Kumar
 
Hacking Presentation
Animesh Behera
 
Complete notes security
Kitkat Emoo
 
Internet security powerpoint
Arifa Ali
 
Ad

Recently uploaded (20)

PPTX
Explorando Recursos do Summer '25: Dicas Essenciais - 02
Mauricio Alexandre Silva
 
PPTX
Accounting Skills Paper-I, Preparation of Vouchers
Dr. Sushil Bansode
 
PPTX
Views on Education of Indian Thinkers Mahatma Gandhi.pptx
ShrutiMahanta1
 
PPTX
Capitol Doctoral Presentation -July 2025.pptx
CapitolTechU
 
PDF
CEREBRAL PALSY: NURSING MANAGEMENT .pdf
PRADEEP ABOTHU
 
PPTX
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
PPTX
Optimizing Cancer Screening With MCED Technologies: From Science to Practical...
i3 Health
 
PPTX
How to Configure Access Rights of Manufacturing Orders in Odoo 18 Manufacturing
Celine George
 
PPTX
How to Create Rental Orders in Odoo 18 Rental
Celine George
 
PPSX
HEALTH ASSESSMENT (Community Health Nursing) - GNM 1st Year
Priyanshu Anand
 
PPTX
How to Configure Prepayments in Odoo 18 Sales
Celine George
 
PPSX
Health Planning in india - Unit 03 - CHN 2 - GNM 3RD YEAR.ppsx
Priyanshu Anand
 
PPTX
Nutri-QUIZ-Bee-Elementary.pptx...................
ferdinandsanbuenaven
 
PPTX
Gall bladder, Small intestine and Large intestine.pptx
rekhapositivity
 
PDF
Zoology (Animal Physiology) practical Manual
raviralanaresh2
 
PPTX
LEGAL ASPECTS OF PSYCHIATRUC NURSING.pptx
PoojaSen20
 
PDF
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
PDF
ARAL-Orientation_Morning-Session_Day-11.pdf
JoelVilloso1
 
PPTX
Latest Features in Odoo 18 - Odoo slides
Celine George
 
PPTX
How to Manage Promotions in Odoo 18 Sales
Celine George
 
Explorando Recursos do Summer '25: Dicas Essenciais - 02
Mauricio Alexandre Silva
 
Accounting Skills Paper-I, Preparation of Vouchers
Dr. Sushil Bansode
 
Views on Education of Indian Thinkers Mahatma Gandhi.pptx
ShrutiMahanta1
 
Capitol Doctoral Presentation -July 2025.pptx
CapitolTechU
 
CEREBRAL PALSY: NURSING MANAGEMENT .pdf
PRADEEP ABOTHU
 
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
Optimizing Cancer Screening With MCED Technologies: From Science to Practical...
i3 Health
 
How to Configure Access Rights of Manufacturing Orders in Odoo 18 Manufacturing
Celine George
 
How to Create Rental Orders in Odoo 18 Rental
Celine George
 
HEALTH ASSESSMENT (Community Health Nursing) - GNM 1st Year
Priyanshu Anand
 
How to Configure Prepayments in Odoo 18 Sales
Celine George
 
Health Planning in india - Unit 03 - CHN 2 - GNM 3RD YEAR.ppsx
Priyanshu Anand
 
Nutri-QUIZ-Bee-Elementary.pptx...................
ferdinandsanbuenaven
 
Gall bladder, Small intestine and Large intestine.pptx
rekhapositivity
 
Zoology (Animal Physiology) practical Manual
raviralanaresh2
 
LEGAL ASPECTS OF PSYCHIATRUC NURSING.pptx
PoojaSen20
 
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
ARAL-Orientation_Morning-Session_Day-11.pdf
JoelVilloso1
 
Latest Features in Odoo 18 - Odoo slides
Celine George
 
How to Manage Promotions in Odoo 18 Sales
Celine George
 

PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)

  • 1. A summary of types of attacks II.
  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Sniffer and password attacks. – Social engineering attacks. PACE-IT.
  • 4. Page 4 A summary of types of attacks II.
  • 5. Page 5 Quite often, an attacker (hacker) will use a sniffer type attack in order to determine what type of attack to use on a network. Sniffer attacks use specialized software to examine the network for vulnerabilities. That software may conduct a port scan— looking for either open or vulnerable ports that can be exploited. Or, the software may be used to examine network packets in order to determine what applications, protocols, and services are in use on the network. A common port scanning attack is the XMAS scan. With the XMAS scan, each packet sent by the scanner has three of the six possible flags set (so it is lit up like a Christmas tree) in order to keep the scan from being discovered. A summary of types of attacks II.
  • 6. Page 6 Unfortunately, end user passwords often present an attacker with an easy entry into the network. Even when network administers try to create a strong password policy, end users often attempt to create easy to remember passwords. Usually, if the password is easy to remember, it is easy to crack. In studies conducted on passwords, some of the most common include: 12345678, password, qwerty and letmein. These do not represent much of a challenge to the hacker. Attackers also have other tools that they can use in a password attack. A summary of types of attacks II.
  • 7. Page 7 – Types of password attacks. » Dictionary attack: the attacker uses a specialized software that contains a list of the most popular usernames and a list of all of the words in a language. • The program runs through all of the possible combinations in an attempt to find one that works. » Brute force attack: an attacker uses a password cracking application that mathematically calculates every possible password combination. • Takes a large amount of computing power and time in order to be successful. • A rainbow table may speed up the process. It contains a list of all of the possible characters and combinations that can be used to create a password. » Hybrid attack: uses a combination of the dictionary attack and the brute force attack. » Birthday attack: an attempt to duplicate a hashed value that is used to authenticate a user or system. • The attacker uses a program that hashes data in an effort to recreate a known hashed value; if enough data is input, eventually the hashed value will be duplicated. A summary of types of attacks II.
  • 8. Page 8 A summary of types of attacks II.
  • 9. Page 9 – Phishing attack. » The hacker typically casts out a broad net of emails that appear to be from a trusted source (e.g., a well known bank or Google) that requests that the user click on a hyperlink. • The hyperlink connects to a malicious website and, when the user inputs his or her credentials (as requested), the attacker then steals the user’s credentials. » Spear phishing attacks are similar to phishing attacks, but more directed. • The hacker’s email appears to come from an even more trusted source (e.g., from management or a trusted coworker). – Pharming attack. » The attacker uses DNS poisoning to redirect traffic from legitimate sites to a different or malicious site. – Vishing. » Using the telephone to perform a phishing attack. • The attacker impersonates a trusted source (or attempts to impersonate a trusted source). A summary of types of attacks II.
  • 10. Page 10 A summary of types of attacks II. Hackers will often use a sniffer type attack when attempting to determine what other type of attack will work against a network. Sniffer attacks can scan networks for open ports and vulnerabilities. A common port scanning attack is the XMAS scan. Passwords often represent a vulnerability to network security. Hackers may use dictionary, brute force, or hybrid attacks in an attempt to crack passwords. Birthday attacks attempt to duplicate a hashed value that is used for authentication. Topic Sniffer and password attacks. Summary Over the years, social engineering attacks have proven to be a successful avenue for hackers to use. Some of the methods used for social engineering attacks include: phishing, spear phishing, pharming, and vishing. Social engineering attacks.
  • 12. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.