Cybersecurity Network Attacks


Network Attacks Overview

  • Attacks exploit vulnerabilities in services, often using bugs or misconfigurations.
  • Tools like EyeWitness help identify exposed assets via port scanning and screenshotting.

Buffer Overflows

  • Occur due to poor memory handling, typically in C/C++ programs.
  • When more data is written than a buffer can handle, the return pointer can be overwritten.
  • This allows Remote Code Execution (RCE) where attackers run arbitrary code.

Vulnerability Scanners

  • Used to detect known vulnerabilities (not zero-days).
  • Support authenticated scanning for deeper insights.
  • Examples: Nessus, OpenVAS, Qualys.

Code Execution & Shells

Payloads delivered post-exploitation include:

  • Reverse Shell: Victim connects back to attacker.
  • Bind Shell: Victim listens on a port, attacker connects to it.

Firewalls can block inbound connections, making egress traffic (reverse shells) a common tactic.


Network Monitoring & C2 Detection

  • Attackers control compromised hosts via Command & Control (C2) channels.
  • Detection techniques include:
  • Identifying long or abnormal HTTP/S connections.
  • Monitoring beaconing behavior.
  • Detecting large or unexpected data transfers (strobes).
  • Contextual analysis is key — not all alerts are equal; IP origin and behavior help prioritize.

Peer-to-Peer Traffic

  • Attackers exploit lateral movement using protocols like SMB (port 445).
  • Peer-to-peer communication bypasses traditional client-server monitoring and can abuse weak endpoints.

Prefer Learning by Watching?

Watch these YouTube tutorials to understand CYBERSECURITY Tutorial visually:

What You'll Learn:
  • 📌 Network Attacks - Everything You Need to Know in 20 Minutes
  • 📌 Common Types of Network Attacks
Previous Next