Network Attacks
In this module, you will:
- Explain the basics of the web browsing protocol (HTTP)
- Discuss the concept of the man-in-the-middle (MITM) attacker
- Demonstrate how ARP-spoof can turn the attacker into a MITM
- Demonstrate how code-injection attack works
- Use freely available tools to demonstrate multiple cyberattacks
Browsing Attacks
Download and read these slides to see how users can be forcefully navigated to pages they did not choose to go
Browsing Attacks.pdfHere is the lab mentioned in the slides, in a document format
Browsing Attacks Lab.pdf
Scaring Users
Download and read these slides to see how alerts and harmful scripts can be injected into web responses
Scaring Users.pdfHere is the lab mentioned in the slides, in a document format
Scaring Users Lab.pdf
Capturing Keys
Download and read these slides to see how keys pressed on a user's keyboard can be captured with malicious script injections
Capturing Keys.pdfHere is the lab mentioned in the slides, in a document format
Capturing Keys Lab.pdf
Additional Attacks
Look at many other attacks like Man-in-the-Middle and ARP spoofing
Additional Attacks.zip