Attacks that involve intercepting network packets include Man-in-the-Middle (MitM) attacks, where an attacker eavesdrops on or alters communication between two parties. Packet sniffing is another method, often used to capture sensitive data such as passwords and credit card information from unencrypted traffic. Additionally, session hijacking can occur when an attacker intercepts and takes over a user's active session by capturing session tokens or cookies.
1) Man-in-the-middle 2) TCP/IP hijacking
Packets Words
A firewall is the device used to protect one network from another by filtering packets. It monitors and controls incoming and outgoing network traffic based on predetermined security rules. Firewalls can be hardware-based, software-based, or a combination of both, and they help prevent unauthorized access and attacks on a network.
A firewall can be configured to block ICMP packets, but it depends on the specific rules set by the network administrator. By default, many firewalls allow ICMP traffic for essential functions like ping and network diagnostics. However, to enhance security, some firewalls may restrict or block certain types of ICMP packets to prevent potential attacks or network scanning. Ultimately, whether ICMP packets are blocked or allowed is determined by the firewall's configuration.
tunneling
Packets
When packets are too big for a network to handle, they may be fragmented into smaller packets for transmission. If fragmentation is not possible, the packets may be dropped, leading to data loss and requiring retransmission. This can result in increased latency and reduced overall network performance. Additionally, oversized packets can cause congestion and inefficiencies in network routing and processing.
network flooding can use up a lot of bandwidth. network flooding is often taken advantage of in ping floods or a denial of service attacks, causing the network to crash or at least the quality of service go down. also if you don't include a time to live count or have each node keep track of which packets have been forwarded, than there is a possibility that duplicate packets will circulate forever
The network layer is the layer that is responsible for routing packets on the network. This is the layer in which Internet protocol operates. In the seven layer OSI model, the network layer is the third layer from the bottom.
Network
As load exceeds network capacity, packets gets jammed at nodes. These packets never go forward unless load goes below network capacity. Hence when load exceeds network capacity delay tends to infinity. As load exceeds network capacity, packets gets jammed at nodes. These packets never go forward unless load goes below network capacity. Hence when load exceeds network capacity delay tends to infinity.
Network Layer ( 3 )