

MITM –> intercepts legitimate traffic between 2, attacker controls info flow & can alter comm Remote access Non-blind spoofing –> attacker in the same subnet, sniffs the seq/ack numbers and hijacks the sessionīlind spoofing –> pkts sent to victim to obtain a sampling of seq numbers & generate a valid seq number for the attack (works on older systems) Noise –> interference introduced to the cables, distorts the signal –> problemsĪttenuation –> weakening of the signal as it travels down the cableĬrosstalk –> wires in parallel –> signals interfere w/ each other & distort the signalĮavesdropping –> fiber optic is the safest ! Network attacks VSAN (Virtual Storage Area Network) –> sw-defined storage that allows pooling of storage capabilities & instant/automatic provisioning of VM storage.

SDN (Software Defined Network) –> physical separation of network control plane from fwd plane (decisions are taken remote, not on the hardware)

Screen scraping is the act of copying information that shows on a digital display so it can be used for another purpose. VPN screen scraper = app that allows an attacker to capture what is on the user’s display (abernathy?)
