# Introduction to intrusion tactics

# The case for securing networks

<div class="cds-185 css-xl5mb3 cds-186" id="bkmrk-let%27s-start-by-answe"><div class="cds-185 rc-Paragraph css-1lz62pp cds-187 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Let's start by answering the question, why do we need secure networks?" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">Let's start by answering the question, why do we need secure networks? </span></div><div aria-label="toggle video from As you've learned, networks are constantly at risk of attack from malicious hackers." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">As you've learned, networks are constantly at risk of attack from malicious hackers. </span></div><div aria-label="toggle video from Attackers can infiltrate networks via malware, spoofing, or packet sniffing." class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">Attackers can infiltrate networks via malware, spoofing, or packet sniffing. </span></div><div aria-label="toggle video from Network operations can also be disrupted by attacks such as packet flooding." class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">Network operations can also be disrupted by attacks such as packet flooding. </span></div><div aria-label="toggle video from As we go along, you're going to learn about these and" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">As we go along, you're going to learn about these and </span></div><div aria-label="toggle video from other common network intrusion attacks in more detail." class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">other common network intrusion attacks in more detail. </span></div></div></div></div><div class="cds-185 css-xl5mb3 cds-186" id="bkmrk-"><div class="cds-185 rc-Paragraph css-1lz62pp cds-187 cds-grid-item">  
</div></div><div class="cds-185 css-xl5mb3 cds-186" id="bkmrk-protecting-a-network"><div class="cds-185 rc-Paragraph css-1lz62pp cds-187 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Protecting a network from these types of attacks is important." class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">Protecting a network from these types of attacks is important. </span></div><div aria-label="toggle video from If even one of them happens, it could have a catastrophic impact on an organization." class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">If even one of them happens, it could have a catastrophic impact on an organization. </span></div><div aria-label="toggle video from Attacks can harm an organization by leaking valuable or" class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">Attacks can harm an organization by leaking valuable or </span></div><div aria-label="toggle video from confidential information." class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">confidential information. </span></div><div aria-label="toggle video from They can also be damaging to an organization's reputation and" class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">They can also be damaging to an organization's reputation and </span></div><div aria-label="toggle video from impact customer retention." class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">impact customer retention. </span></div><div aria-label="toggle video from Mitigating attacks may also cost the organization money and time." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">Mitigating attacks may also cost the organization money and time. </span></div></div></div></div><div class="cds-185 css-xl5mb3 cds-186" id="bkmrk--1"><div class="cds-185 rc-Paragraph css-1lz62pp cds-187 cds-grid-item">  
</div></div><div class="cds-185 css-xl5mb3 cds-186" id="bkmrk-over-the-last-few-ye"><div class="cds-185 rc-Paragraph css-1lz62pp cds-187 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Over the last few years," class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">Over the last few years, </span></div><div aria-label="toggle video from there have been a number of examples of damage that cyber attacks can cause." class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">there have been a number of examples of damage that cyber attacks can cause. </span></div><div aria-label="toggle video from One notorious example was an attack against the American home-improvement" class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">One notorious example was an attack against the American home-improvement </span></div><div aria-label="toggle video from chain, Home Depot, in 2014." class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">chain, Home Depot, in 2014. </span></div><div aria-label="toggle video from A group of hackers compromised and infected Home Depot servers with malware." class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">A group of hackers compromised and infected Home Depot servers with malware. </span></div><div aria-label="toggle video from By the time network administrators shut down the attack, the hackers had already" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">By the time network administrators shut down the attack, the hackers had already </span></div><div aria-label="toggle video from taken the credit and debit card information for over 56 million customers." class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">taken the credit and debit card information for over 56 million customers. </span></div></div></div></div><div class="cds-185 css-xl5mb3 cds-186" id="bkmrk--2"><div class="cds-185 rc-Paragraph css-1lz62pp cds-187 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-now%2C-you-know-why-it"><div aria-label="toggle video from Now, you know why it's so important to secure a network." class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">Now, you know why it's so important to secure a network. </span></div><div aria-label="toggle video from But to keep a network secure," class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">But to keep a network secure, </span></div><div aria-label="toggle video from you need to know what kinds of attacks to protect it from." class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">you need to know what kinds of attacks to protect it from. </span></div><div aria-label="toggle video from current lecture segment: Coming up, you'll learn about some common network attacks." class="rc-Phrase active css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-321 css-80vnnb cds-323">Coming up, you'll learn about some common network attacks. </span></div></div># How intrusions compromise your system

In this section of the course, you learned that every network has inherent vulnerabilities and could become the target of a network attack.

Attackers could have varying motivations for attacking your organization’s network. They may have financial, personal, or political motivations, or they may be a disgruntled employee or an activist who disagrees with the company's values and wants to harm an organization’s operations. Malicious actors can target any network. Security analysts must be constantly alert to potential vulnerabilities in their organization’s network and take quick action to mitigate them.

In this reading, you’ll learn about network interception attacks and backdoor attacks, and the possible impacts these attacks could have on an organization.

## Network interception attacks 

Network interception attacks work by intercepting network traffic and stealing valuable information or interfering with the transmission in some way.

Malicious actors can use hardware or software tools to capture and inspect data in transit. This is referred to as **packet sniffing**. In addition to seeing information that they are not entitled to, malicious actors can also intercept network traffic and alter it. These attacks can cause damage to an organization’s network by inserting malicious code modifications or altering the message and interrupting network operations. For example, an attacker can intercept a bank transfer and change the account receiving the funds to one that the attacker controls.

Later in this course you will learn more about malicious packet sniffing, and other types of network interception attacks: on-path attacks and replay attacks.

## Backdoor attacks

A **backdoor attack** is another type of attack you will need to be aware of as a security analyst. An organization may have a lot of security measures in place, including cameras, biometric scans and access codes to keep employees from entering and exiting without being seen. However, an employee might work around the security measures by finding a backdoor to the building that is not as heavily monitored, allowing them to sneak out for the afternoon without being seen.

In cybersecurity, backdoors are weaknesses intentionally left by programmers or system and network administrators that bypass normal access control mechanisms. Backdoors are intended to help programmers conduct troubleshooting or administrative tasks. However, backdoors can also be installed by attackers after they’ve compromised an organization to ensure they have persistent access.

Once the hacker has entered an insecure network through a backdoor, they can cause extensive damage: installing malware, performing a denial of service (DoS) attack, stealing private information or changing other security settings that leaves the system vulnerable to other attacks. A **DoS attack** is an attack that targets a network or server and floods it with network traffic.

## Possible impacts on an organization

As you’ve learned already, network attacks can have a significant negative impact on an organization. Let’s examine some potential consequences.

<div aria-label="toggle video from current lecture segment: Coming up, you'll learn about some common network attacks." class="rc-Phrase active css-ugczj4" data-cue="24" data-cue-index="23" id="bkmrk-financial%3A-when-a-sy" role="button" tabindex="0"><div aria-label="toggle video from current lecture segment: Coming up, you'll learn about some common network attacks." class="rc-Phrase active css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><div class="rc-CML" dir="auto"><div class="rc-CML" dir="auto"><div><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout"><div class="css-1k5v0wb" data-testid="cml-viewer">- **Financial**: When a system is taken offline with a DoS attack, or business operations are halted or slowed down by some other tactic, they prevent a company from performing the tasks that generate revenue. Depending on the size of an organization, interrupted operations can cost millions of dollars. In addition, if a malicious actor gets access to the personal information of the company’s clients or customers, the company may face heavy litigation and settlement costs if customers seek legal recourse.
- **Reputation**: Attacks can also have a negative impact on the reputation of an organization. If it becomes public knowledge that a company has experienced a cyber attack, the public may become concerned about the security practices of the organization. They may stop trusting the company with their personal information and choose a competitor to fulfill their needs.
- **Public safety**: If an attack occurs on a government network, this can potentially impact the safety and welfare of the citizens of a country. In recent years, defense agencies across the globe are investing heavily in combating cyber warfare tactics. If a malicious actor gained access to a power grid, a public water system, or even a military defense communication system, the public could face physical harm due to a network intrusion attack.

</div></div></div></div></div></div></div></div>## Key takeaways

Malicious actors are constantly looking for ways to exploit systems. They learn about new vulnerabilities as they arise and attempt to exploit every vulnerability in a system. Attackers leverage backdoor attack methods and network interception attacks to gain sensitive information they can use to exploit an organization or cause serious damage. These types of attacks can impact an organization financially, damage its reputation, and potentially put the public in danger. It is important that security analysts stay educated in order to maintain network safety and reduce the likelihood and impact of these types of attacks. Securing networks has never been more important.

# Matt: A professional on dealing with attacks

<div class="phrases" id="bkmrk-my-name%27s-matt%2C-i%27m-"><div aria-label="toggle video from My name's Matt, I'm a chaos specialist at Google." class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">My name's Matt, I'm a chaos specialist at Google. </span></div><div aria-label="toggle video from They let us choose our own job titles to best describe what it is we do." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">They let us choose our own job titles to best describe what it is we do. </span></div><div aria-label="toggle video from I spend a lot of my time planning for" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I spend a lot of my time planning for </span></div><div aria-label="toggle video from how to take care of anything that might possibly be going wrong, and" class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">how to take care of anything that might possibly be going wrong, and </span></div><div aria-label="toggle video from when it does happen, putting a team in place to fix it as quickly as possible." class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">when it does happen, putting a team in place to fix it as quickly as possible. </span></div><div aria-label="toggle video from I had no intention of being in technology at all." class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I had no intention of being in technology at all. </span></div><div aria-label="toggle video from current lecture segment: In high school, I was a lifeguard, first at public pools and then at a state beach." class="rc-Phrase active css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In high school, I was a lifeguard, first at public pools and then at a state beach. </span></div><div aria-label="toggle video from Lifeguarding got me into really enjoying rescue." class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Lifeguarding got me into really enjoying rescue. </span></div><div aria-label="toggle video from So I got an EMT license, went through firefighter school. About halfway through" class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">So I got an EMT license, went through firefighter school. About halfway through </span></div><div aria-label="toggle video from my college process, and well into when I was being a firefighter on a daily basis." class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">my college process, and well into when I was being a firefighter on a daily basis. </span></div><div aria-label="toggle video from I was dealing with some burnout, some stress." class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I was dealing with some burnout, some stress. </span></div><div aria-label="toggle video from I needed a change in my life." class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I needed a change in my life. </span></div><div aria-label="toggle video from And a friend of mine who I'd been online gaming with since the early days" class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">And a friend of mine who I'd been online gaming with since the early days </span></div><div aria-label="toggle video from of online gaming, when it was all text based," class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">of online gaming, when it was all text based, </span></div><div aria-label="toggle video from he said, I can tell you're burning out hard and you need a change." class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">he said, I can tell you're burning out hard and you need a change. </span></div><div aria-label="toggle video from My friends and I are going to San Francisco to start a startup." class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">My friends and I are going to San Francisco to start a startup. </span></div><div aria-label="toggle video from Will you come with us?" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Will you come with us? </span></div><div aria-label="toggle video from And I said, you realize I am not a computer guy, right?" class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">And I said, you realize I am not a computer guy, right? </span></div><div aria-label="toggle video from And he said, no, you're a computer guy, you just won't admit it." class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">And he said, no, you're a computer guy, you just won't admit it. </span></div><div aria-label="toggle video from The same thing that has drawn me into incident response in tech is what" class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The same thing that has drawn me into incident response in tech is what </span></div><div aria-label="toggle video from originally drew me to medical response." class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">originally drew me to medical response. </span></div><div aria-label="toggle video from I really love being there for people on their worst day." class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I really love being there for people on their worst day. </span></div><div aria-label="toggle video from Being there when people really need you and" class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Being there when people really need you and </span></div><div aria-label="toggle video from they don't know where else to turn to has always just fed this part of me, and" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">they don't know where else to turn to has always just fed this part of me, and </span></div><div aria-label="toggle video from I'm lucky to find that same joy in DFIR, Digital Forensics and Incident Response." class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I'm lucky to find that same joy in DFIR, Digital Forensics and Incident Response. </span></div><div aria-label="toggle video from What type of attacks have we faced at Google?" class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">What type of attacks have we faced at Google? </span></div><div aria-label="toggle video from That's a hard question to answer," class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">That's a hard question to answer, </span></div><div aria-label="toggle video from because we face all of the kinds of attacks that most other companies face." class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">because we face all of the kinds of attacks that most other companies face. </span></div><div aria-label="toggle video from People after ransomware, people after industrial secrets," class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">People after ransomware, people after industrial secrets, </span></div><div aria-label="toggle video from other countries looking for intelligence information." class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">other countries looking for intelligence information. </span></div><div aria-label="toggle video from There was a really interesting attack that occurred a little while ago." class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">There was a really interesting attack that occurred a little while ago. </span></div><div aria-label="toggle video from They were interested in getting a lot of information from technical companies," class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">They were interested in getting a lot of information from technical companies, </span></div><div aria-label="toggle video from specifically about vulnerabilities in software." class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">specifically about vulnerabilities in software. </span></div><div aria-label="toggle video from And they put in place a long running campaign to build personalities on" class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">And they put in place a long running campaign to build personalities on </span></div><div aria-label="toggle video from social media as though they were legitimate security researchers, and" class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">social media as though they were legitimate security researchers, and </span></div><div aria-label="toggle video from then reach out to other security researchers in our field," class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">then reach out to other security researchers in our field, </span></div><div aria-label="toggle video from build relationships, and then just at the right moment, sneak in some malware." class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">build relationships, and then just at the right moment, sneak in some malware. </span></div><div aria-label="toggle video from Being under attack by an adversary who's made some progress is incredibly" class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Being under attack by an adversary who's made some progress is incredibly </span></div><div aria-label="toggle video from stressful." class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">stressful. </span></div><div aria-label="toggle video from The first things you're thinking and" class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The first things you're thinking and </span></div><div aria-label="toggle video from feeling are a little bit of a sense of panic." class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">feeling are a little bit of a sense of panic. </span></div><div aria-label="toggle video from Oh no, this is going to be a bad day." class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Oh no, this is going to be a bad day. </span></div><div aria-label="toggle video from How long am I going to be awake working on this?" class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">How long am I going to be awake working on this? </span></div><div aria-label="toggle video from What have they done?" class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">What have they done? </span></div><div aria-label="toggle video from What am I going to do?" class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">What am I going to do? </span></div><div aria-label="toggle video from And for me, the mantra that I repeat to myself is, as an incident responder," class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">And for me, the mantra that I repeat to myself is, as an incident responder, </span></div><div aria-label="toggle video from I am here to help." class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I am here to help. </span></div><div aria-label="toggle video from The things that are most important to having a good outcome" class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The things that are most important to having a good outcome </span></div><div aria-label="toggle video from in an incident are what we call the 3Cs: Command, Control and" class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">in an incident are what we call the 3Cs: Command, Control and </span></div><div aria-label="toggle video from Communications. Meaning someone needs to be in charge of it affirmatively leading." class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Communications. Meaning someone needs to be in charge of it affirmatively leading. </span></div><div aria-label="toggle video from Someone needs to be exerting control over everyone involved so" class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Someone needs to be exerting control over everyone involved so </span></div><div aria-label="toggle video from that everyone's aligned, focused on the mission, and the biggest and" class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that everyone's aligned, focused on the mission, and the biggest and </span></div><div aria-label="toggle video from most important one of them all: proper communications." class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">most important one of them all: proper communications. </span></div><div aria-label="toggle video from If you have something to offer to the incident," class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">If you have something to offer to the incident, </span></div><div aria-label="toggle video from don't just go do it, Communicate to someone." class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">don't just go do it, Communicate to someone. </span></div><div aria-label="toggle video from I think I could do this to help us make progress." class="rc-Phrase css-ugczj4" data-cue="56" data-cue-index="55" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I think I could do this to help us make progress. </span></div><div aria-label="toggle video from I think if we look over here, we'll find more data." class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I think if we look over here, we'll find more data. </span></div><div aria-label="toggle video from The advice that I would give somebody who wants to get into cybersecurity is if you" class="rc-Phrase css-ugczj4" data-cue="58" data-cue-index="57" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The advice that I would give somebody who wants to get into cybersecurity is if you </span></div><div aria-label="toggle video from want it, you probably belong here." class="rc-Phrase css-ugczj4" data-cue="59" data-cue-index="58" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">want it, you probably belong here. </span></div><div aria-label="toggle video from The more people we have in here, who are passionate, curious question askers," class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The more people we have in here, who are passionate, curious question askers, </span></div><div aria-label="toggle video from who want to know more, who want to build better, and who care about" class="rc-Phrase css-ugczj4" data-cue="61" data-cue-index="60" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">who want to know more, who want to build better, and who care about </span></div><div aria-label="toggle video from making every thing more secure for the people who have to use technology," class="rc-Phrase css-ugczj4" data-cue="62" data-cue-index="61" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">making every thing more secure for the people who have to use technology, </span></div><div aria-label="toggle video from those are people we want in the industry and I would want you here." class="rc-Phrase css-ugczj4" data-cue="63" data-cue-index="62" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">those are people we want in the industry and I would want you here. </span></div></div>

# Denial of Service (DoS) attacks

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-welcome-back.-in-thi"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Welcome back. In this video," class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Welcome back. In this video, </span></div><div aria-label="toggle video from we're going to discuss denial of service attacks." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">we're going to discuss denial of service attacks. </span></div><div aria-label="toggle video from A denial of service attack is" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A denial of service attack is </span></div><div aria-label="toggle video from an attack that targets a network or server" class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">an attack that targets a network or server </span></div><div aria-label="toggle video from and floods it with network traffic." class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and floods it with network traffic. </span></div><div aria-label="toggle video from The objective of a denial of service attack," class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The objective of a denial of service attack, </span></div><div aria-label="toggle video from or a DoS attack, is to disrupt" class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">or a DoS attack, is to disrupt </span></div><div aria-label="toggle video from normal business operations by" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">normal business operations by </span></div><div aria-label="toggle video from overloading an organization's network." class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">overloading an organization's network. </span></div><div aria-label="toggle video from The goal of the attack is to send" class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The goal of the attack is to send </span></div><div aria-label="toggle video from so much information to a network device" class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">so much information to a network device </span></div><div aria-label="toggle video from that it crashes or is" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that it crashes or is </span></div><div aria-label="toggle video from unable to respond to legitimate users." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">unable to respond to legitimate users. </span></div><div aria-label="toggle video from This means that the organization won't" class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This means that the organization won't </span></div><div aria-label="toggle video from current lecture segment: be able to conduct their normal business operations," class="rc-Phrase active css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">be able to conduct their normal business operations, </span></div><div aria-label="toggle video from which can cost them money and time." class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">which can cost them money and time. </span></div><div aria-label="toggle video from A network crash can also leave them" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A network crash can also leave them </span></div><div aria-label="toggle video from vulnerable to other security threats and attacks." class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">vulnerable to other security threats and attacks. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-a-distributed-denial"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from A distributed denial of service attack, or DDoS," class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A distributed denial of service attack, or DDoS, </span></div><div aria-label="toggle video from is a kind of DoS attack that uses" class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">is a kind of DoS attack that uses </span></div><div aria-label="toggle video from multiple devices or servers in" class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">multiple devices or servers in </span></div><div aria-label="toggle video from different locations to flood" class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">different locations to flood </span></div><div aria-label="toggle video from the target network with unwanted traffic." class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the target network with unwanted traffic. </span></div><div aria-label="toggle video from Use of numerous devices makes it more likely that" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Use of numerous devices makes it more likely that </span></div><div aria-label="toggle video from the total amount of traffic" class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the total amount of traffic </span></div><div aria-label="toggle video from sent will overwhelm the target server." class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">sent will overwhelm the target server. </span></div><div aria-label="toggle video from Remember, DoS stands for denial of service." class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Remember, DoS stands for denial of service. </span></div><div aria-label="toggle video from So it doesn't matter what part" class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">So it doesn't matter what part </span></div><div aria-label="toggle video from of the network the attacker overloads;" class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">of the network the attacker overloads; </span></div><div aria-label="toggle video from if they overload anything, they win." class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">if they overload anything, they win. </span></div><div aria-label="toggle video from An unfortunate example I've" class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">An unfortunate example I've </span></div><div aria-label="toggle video from seen is an attacker who crafted" class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">seen is an attacker who crafted </span></div><div aria-label="toggle video from a very careful packet that caused" class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a very careful packet that caused </span></div><div aria-label="toggle video from a router to spend extra time processing the request." class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a router to spend extra time processing the request. </span></div><div aria-label="toggle video from The overall traffic volume didn't overload the router;" class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The overall traffic volume didn't overload the router; </span></div><div aria-label="toggle video from the specifics within the packet did." class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the specifics within the packet did. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-now-we%27ll-discuss-ne"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Now we'll discuss network level DoS attacks" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now we'll discuss network level DoS attacks </span></div><div aria-label="toggle video from that target network bandwidth to slow traffic." class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that target network bandwidth to slow traffic. </span></div><div aria-label="toggle video from Let's learn about three common network level DoS attacks." class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's learn about three common network level DoS attacks. </span></div><div aria-label="toggle video from The first is called a SYN flood attack." class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The first is called a SYN flood attack. </span></div><div aria-label="toggle video from A SYN flood attack is a type of" class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A SYN flood attack is a type of </span></div><div aria-label="toggle video from DoS attack that simulates the TCP connection" class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">DoS attack that simulates the TCP connection </span></div><div aria-label="toggle video from and floods the server with SYN packets." class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and floods the server with SYN packets. </span></div><div aria-label="toggle video from Let's break this definition down a bit" class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's break this definition down a bit </span></div><div aria-label="toggle video from more by taking a closer look at" class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">more by taking a closer look at </span></div><div aria-label="toggle video from the handshake process that is used to establish" class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the handshake process that is used to establish </span></div><div aria-label="toggle video from a TCP connection between a device and a server." class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a TCP connection between a device and a server. </span></div><div aria-label="toggle video from The first step in the handshake is for the device to send" class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The first step in the handshake is for the device to send </span></div><div aria-label="toggle video from a SYN, or synchronize, request to the server." class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a SYN, or synchronize, request to the server. </span></div><div aria-label="toggle video from Then, the server responds with" class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Then, the server responds with </span></div><div aria-label="toggle video from a SYN/ACK packet to" class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a SYN/ACK packet to </span></div><div aria-label="toggle video from acknowledge the receipt of the device's request" class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">acknowledge the receipt of the device's request </span></div><div aria-label="toggle video from and leaves a port open for" class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and leaves a port open for </span></div><div aria-label="toggle video from the final step of the handshake." class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the final step of the handshake. </span></div><div aria-label="toggle video from Once the server receives" class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Once the server receives </span></div><div aria-label="toggle video from the final ACK packet from the device," class="rc-Phrase css-ugczj4" data-cue="56" data-cue-index="55" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the final ACK packet from the device, </span></div><div aria-label="toggle video from a TCP connection is established." class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a TCP connection is established. </span></div><div aria-label="toggle video from Malicious actors can take advantage of the protocol by" class="rc-Phrase css-ugczj4" data-cue="58" data-cue-index="57" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Malicious actors can take advantage of the protocol by </span></div><div aria-label="toggle video from flooding a server with" class="rc-Phrase css-ugczj4" data-cue="59" data-cue-index="58" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">flooding a server with </span></div><div aria-label="toggle video from SYN packet requests for the first part of the handshake." class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">SYN packet requests for the first part of the handshake. </span></div><div aria-label="toggle video from But if the number of SYN requests is" class="rc-Phrase css-ugczj4" data-cue="61" data-cue-index="60" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">But if the number of SYN requests is </span></div><div aria-label="toggle video from larger than the number of available ports on the server," class="rc-Phrase css-ugczj4" data-cue="62" data-cue-index="61" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">larger than the number of available ports on the server, </span></div><div aria-label="toggle video from then the server will be overwhelmed" class="rc-Phrase css-ugczj4" data-cue="63" data-cue-index="62" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">then the server will be overwhelmed </span></div><div aria-label="toggle video from and become unable to function." class="rc-Phrase css-ugczj4" data-cue="64" data-cue-index="63" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and become unable to function. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-let%27s-discuss-two-ot"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Let's discuss two other common DoS attacks" class="rc-Phrase css-ugczj4" data-cue="65" data-cue-index="64" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's discuss two other common DoS attacks </span></div><div aria-label="toggle video from that use another protocol called ICMP." class="rc-Phrase css-ugczj4" data-cue="66" data-cue-index="65" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that use another protocol called ICMP. </span></div><div aria-label="toggle video from ICMP stands for Internet Control Message Protocol." class="rc-Phrase css-ugczj4" data-cue="67" data-cue-index="66" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">ICMP stands for Internet Control Message Protocol. </span></div><div aria-label="toggle video from ICMP is an internet protocol used by devices" class="rc-Phrase css-ugczj4" data-cue="68" data-cue-index="67" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">ICMP is an internet protocol used by devices </span></div><div aria-label="toggle video from to tell each other about" class="rc-Phrase css-ugczj4" data-cue="69" data-cue-index="68" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to tell each other about </span></div><div aria-label="toggle video from data transmission errors across the network." class="rc-Phrase css-ugczj4" data-cue="70" data-cue-index="69" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">data transmission errors across the network. </span></div><div aria-label="toggle video from Think of ICMP like a request" class="rc-Phrase css-ugczj4" data-cue="71" data-cue-index="70" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Think of ICMP like a request </span></div><div aria-label="toggle video from for a status update from a device." class="rc-Phrase css-ugczj4" data-cue="72" data-cue-index="71" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">for a status update from a device. </span></div><div aria-label="toggle video from The device will return" class="rc-Phrase css-ugczj4" data-cue="73" data-cue-index="72" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The device will return </span></div><div aria-label="toggle video from error messages if there is a network concern." class="rc-Phrase css-ugczj4" data-cue="74" data-cue-index="73" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">error messages if there is a network concern. </span></div><div aria-label="toggle video from You can think of this like" class="rc-Phrase css-ugczj4" data-cue="75" data-cue-index="74" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You can think of this like </span></div><div aria-label="toggle video from the ICMP request checking in with" class="rc-Phrase css-ugczj4" data-cue="76" data-cue-index="75" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the ICMP request checking in with </span></div><div aria-label="toggle video from the device to make sure that all is well." class="rc-Phrase css-ugczj4" data-cue="77" data-cue-index="76" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the device to make sure that all is well. </span></div><div aria-label="toggle video from An ICMP flood attack" class="rc-Phrase css-ugczj4" data-cue="78" data-cue-index="77" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">An ICMP flood attack </span></div><div aria-label="toggle video from is a type of DoS attack performed by an attacker" class="rc-Phrase css-ugczj4" data-cue="79" data-cue-index="78" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">is a type of DoS attack performed by an attacker </span></div><div aria-label="toggle video from repeatedly sending ICMP packets to a network server." class="rc-Phrase css-ugczj4" data-cue="80" data-cue-index="79" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">repeatedly sending ICMP packets to a network server. </span></div><div aria-label="toggle video from This forces the server to send an ICMP packet." class="rc-Phrase css-ugczj4" data-cue="81" data-cue-index="80" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This forces the server to send an ICMP packet. </span></div><div aria-label="toggle video from This eventually uses up all the bandwidth for incoming" class="rc-Phrase css-ugczj4" data-cue="82" data-cue-index="81" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This eventually uses up all the bandwidth for incoming </span></div><div aria-label="toggle video from and outgoing traffic and causes the server to crash." class="rc-Phrase css-ugczj4" data-cue="83" data-cue-index="82" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and outgoing traffic and causes the server to crash. </span></div><div aria-label="toggle video from Both of the attacks we've discussed so far," class="rc-Phrase css-ugczj4" data-cue="84" data-cue-index="83" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Both of the attacks we've discussed so far, </span></div><div aria-label="toggle video from SYN flood and ICMP flood," class="rc-Phrase css-ugczj4" data-cue="85" data-cue-index="84" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">SYN flood and ICMP flood, </span></div><div aria-label="toggle video from take advantage of communication protocols" class="rc-Phrase css-ugczj4" data-cue="86" data-cue-index="85" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">take advantage of communication protocols </span></div><div aria-label="toggle video from by sending an overwhelming number of requests." class="rc-Phrase css-ugczj4" data-cue="87" data-cue-index="86" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">by sending an overwhelming number of requests. </span></div><div aria-label="toggle video from There are also attacks that can overwhelm" class="rc-Phrase css-ugczj4" data-cue="88" data-cue-index="87" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">There are also attacks that can overwhelm </span></div><div aria-label="toggle video from the server with one big request." class="rc-Phrase css-ugczj4" data-cue="89" data-cue-index="88" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the server with one big request. </span></div><div aria-label="toggle video from One example that we'll discuss" class="rc-Phrase css-ugczj4" data-cue="90" data-cue-index="89" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">One example that we'll discuss </span></div><div aria-label="toggle video from is called the ping of death." class="rc-Phrase css-ugczj4" data-cue="91" data-cue-index="90" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">is called the ping of death. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--3"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-a-ping-of-death-atta"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from A ping of death attack is" class="rc-Phrase css-ugczj4" data-cue="92" data-cue-index="91" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A ping of death attack is </span></div><div aria-label="toggle video from a type of DoS attack that is caused when a hacker" class="rc-Phrase css-ugczj4" data-cue="93" data-cue-index="92" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a type of DoS attack that is caused when a hacker </span></div><div aria-label="toggle video from pings a system by sending it" class="rc-Phrase css-ugczj4" data-cue="94" data-cue-index="93" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">pings a system by sending it </span></div><div aria-label="toggle video from an oversized ICMP packet" class="rc-Phrase css-ugczj4" data-cue="95" data-cue-index="94" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">an oversized ICMP packet </span></div><div aria-label="toggle video from that is bigger than 64 kilobytes," class="rc-Phrase css-ugczj4" data-cue="96" data-cue-index="95" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that is bigger than 64 kilobytes, </span></div><div aria-label="toggle video from the maximum size for a correctly formed ICMP packet." class="rc-Phrase css-ugczj4" data-cue="97" data-cue-index="96" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the maximum size for a correctly formed ICMP packet. </span></div><div aria-label="toggle video from Pinging a vulnerable network server with" class="rc-Phrase css-ugczj4" data-cue="98" data-cue-index="97" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Pinging a vulnerable network server with </span></div><div aria-label="toggle video from an oversized ICMP packet" class="rc-Phrase css-ugczj4" data-cue="99" data-cue-index="98" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">an oversized ICMP packet </span></div><div aria-label="toggle video from will overload the system and cause it to crash." class="rc-Phrase css-ugczj4" data-cue="100" data-cue-index="99" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">will overload the system and cause it to crash. </span></div><div aria-label="toggle video from Think of this like dropping a rock on a small anthill." class="rc-Phrase css-ugczj4" data-cue="101" data-cue-index="100" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Think of this like dropping a rock on a small anthill. </span></div><div aria-label="toggle video from Each individual ant can carry a certain amount of" class="rc-Phrase css-ugczj4" data-cue="102" data-cue-index="101" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Each individual ant can carry a certain amount of </span></div><div aria-label="toggle video from weight while transporting food to and from the anthill." class="rc-Phrase css-ugczj4" data-cue="103" data-cue-index="102" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">weight while transporting food to and from the anthill. </span></div><div aria-label="toggle video from But if a large rock is dropped on the anthill," class="rc-Phrase css-ugczj4" data-cue="104" data-cue-index="103" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">But if a large rock is dropped on the anthill, </span></div><div aria-label="toggle video from then many ants will be crushed, and the colony is unable to" class="rc-Phrase css-ugczj4" data-cue="105" data-cue-index="104" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">then many ants will be crushed, and the colony is unable to </span></div><div aria-label="toggle video from function until it rebuilds its operations elsewhere." class="rc-Phrase css-ugczj4" data-cue="106" data-cue-index="105" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">function until it rebuilds its operations elsewhere. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--4"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-arowdh cds-3 cds-grid-item cds-48 cds-73" id="bkmrk-now-that%27s-it-for-do"><div><div class="rc-TranscriptHighlighter css-79elbk"><div class="rc-Transcript css-9li235" data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="interactive_transcript" data-track-page="item_layout" role="presentation"><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Now that's it for DoS and DDoS attacks." class="rc-Phrase css-ugczj4" data-cue="107" data-cue-index="106" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now that's it for DoS and DDoS attacks. </span></div><div aria-label="toggle video from Coming up, we'll continue to" class="rc-Phrase css-ugczj4" data-cue="108" data-cue-index="107" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Coming up, we'll continue to </span></div><div aria-label="toggle video from discuss common network attacks." class="rc-Phrase css-ugczj4" data-cue="109" data-cue-index="108" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">discuss common network attacks. </span></div></div></div></div></div></div></div></div><div class="cds-1 css-hcqebr cds-3 cds-grid-item cds-48 cds-66" id="bkmrk--5"><div class="cds-316 cds-formControl-root css-4p0j7c cds-319"><div class="css-1whdyhf" data-testid="visually-hidden">  
</div><label class="cds-320 cds-formLabel-root cds-formLabel-onLight css-wamxw1 cds-325 cds-326" for="cds-react-aria-97" id="bkmrk--6"></label></div></div>

# Read tcpdump logs

A **network protocol analyzer**, sometimes called a packet sniffer or a packet analyzer, is a tool designed to capture and analyze data traffic within a network. They are commonly used as investigative tools to monitor networks and identify suspicious activity. There are a wide variety of network protocol analyzers available, but some of the most common analyzers include:

- SolarWinds NetFlow Traffic Analyzer
- ManageEngine OpManager
- Azure Network Watcher
- Wireshark
- tcpdump

This reading will focus exclusively on tcpdump, though you can apply what you learn here to many of the other network protocol analyzers you'll use as a cybersecurity analyst to defend against any network intrusions. In an upcoming activity, you’ll review a tcpdump data traffic log and identify a DoS attack to practice these skills.

## tcpdump 

**tcpdump** is a command-line network protocol analyzer. It is popular, lightweight–meaning it uses little memory and has a low CPU usage–and uses the open-source libpcap library. tcpdump is text based, meaning all commands in tcpdump are executed in the terminal. It can also be installed on other Unix-based operating systems, such as macOS®. It is preinstalled on many Linux distributions.

tcpdump provides a brief packet analysis and converts key information about network traffic into formats easily read by humans. It prints information about each packet directly into your terminal. tcpdump also displays the source IP address, destination IP addresses, and the port numbers being used in the communications.

## Interpreting output

tcpdump prints the output of the command as the sniffed packets in the command line, and optionally to a log file, after a command is executed. The output of a packet capture contains many pieces of important information about the network traffic.

<div id="bkmrk-"><figure contenteditable="false" role="figure">![types of information presented in a tcpdump packet capture.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/B-PaECh0ToSFgBWpFczYZg_4896abe8c06443f08eec4dc003dcf8f1_image.png?expiry=1688342400000&hmac=5CynS0Xp2yof_cTaZpZkj3Rm8UkSKLzV2pLTXwn2mm8)</figure></div>Some information you receive from a packet capture includes:

- **Timestamp**: The output begins with the timestamp, formatted as hours, minutes, seconds, and fractions of a second.
- **Source IP**: The packet’s origin is provided by its source IP address.
- **Source port**: This port number is where the packet originated.
- **Destination IP**: The destination IP address is where the packet is being transmitted to.
- **Destination port**: This port number is where the packet is being transmitted to.

**Note:** By default, tcpdump will attempt to resolve host addresses to hostnames. It'll also replace port numbers with commonly associated services that use these ports.

## Common uses

tcpdump and other network protocol analyzers are commonly used to capture and view network communications and to collect statistics about the network, such as troubleshooting network performance issues. They can also be used to:

- Establish a baseline for network traffic patterns and network utilization metrics.
- Detect and identify malicious traffic
- Create customized alerts to send the right notifications when network issues or security threats arise.
- Locate unauthorized instant messaging (IM), traffic, or wireless access points.

However, attackers can also use network protocol analyzers maliciously to gain information about a specific network. For example, attackers can capture data packets that contain sensitive information, such as account usernames and passwords. As a cybersecurity analyst, It’s important to understand the purpose and uses of network protocol analyzers.

## Key takeaways

Network protocol analyzers, like tcpdump, are common tools that can be used to monitor network traffic patterns and investigate suspicious activity. tcpdump is a command-line network protocol analyzer that is compatible with Linux/Unix and macOS®. When you run a tcpdump command, the tool will output packet routing information, like the timestamp, source IP address and port number, and the destination IP address and port number. Unfortunately, attackers can also use network protocol analyzers to capture data packets that contain sensitive information, such as account usernames and passwords.

# Real-life DDoS attack

Previously, you were introduced to Denial of Service (DoS) attacks. You also learned that volumetric distributed DoS (DDoS) attacks overwhelm a network by sending unwanted data packets in such large quantities that the servers become unable to service normal users. This can be detrimental to an organization. When systems fail, organizations cannot meet their customers' needs. They often lose money, and in some cases, incur other losses. An organization’s reputation may also suffer if news of a successful DDoS attack reaches consumers, who then question the security of the organization.

In this reading you’ll learn about a 2016 DDoS attack against DNS servers that caused major outages at multiple organizations that have millions of daily users.

## A DDoS targeting a widely used DNS server 

In previous videos, you learned about the function of a DNS server. As a review, DNS servers translate website domain names into the IP address of the system that contains the information for the website. For instance, if a user were to type in a website URL, a DNS server would translate that into a numeric IP address that directs network traffic to the location of the website’s server.

On the day of the DDoS attack we are studying, many large companies were using a DNS service provider. The service provider was hosting the DNS system for these companies. This meant that when internet users typed in the URL of the website they wanted to access, their devices would be directed to the right place. On October 21, 2016, the service provider was the victim of a DDoS attack.

## Leading up to the attack

Before the attack on the service provider, a group of university students created a botnet. A **botnet** is a collection of computers infected by malware that are under the control of a single threat actor, known as the “bot-herder." Each computer in the botnet can be remotely controlled to send a data packet to a target system. In a botnet attack, cyber criminals instruct all the bots on the botnet to send data packets to the target system at the same time, resulting in a DDoS attack.

The group of university students posted the code for the botnet online so that it would be accessible to thousands of internet users and authorities wouldn’t be able to trace the botnet back to the students. In doing so, they made it possible for other malicious actors to learn the code to the botnet and control it remotely. This included the cyber criminals who attacked the DNS service provider.

## The day of attack

At 7:00 a.m. on the day of the attack, the botnet sent tens of millions of DNS requests to the service provider. This overwhelmed the system and the DNS service shut down. This meant that all of the websites that used the service provider could not be reached. When users tried to access various websites that used the service provider, they were not directed to the website they typed in their browser. Outages for each web service occurred all over North America and Europe.

The service provider’s systems were restored after only two hours of downtime. Although the cyber criminals sent subsequent waves of botnet attacks, the DNS company was prepared and able to mitigate the impact.

## Key takeaways

As demonstrated in the above example, DDoS attacks can be very damaging to an organization. As a security analyst, it’s important to acknowledge the seriousness of such an attack so that you’re aware of opportunities to protect the network from them. If your network has important operations distributed across hosts that can be dynamically scaled, then operations can continue if the baseline host infrastructure goes offline. DDoS attacks are damaging, but there are concrete actions that security analysts can take to help protect their organizations. Keep going through this course and you will learn about common mitigation strategies to protect against DDoS attacks.

# Malicious packet sniffing

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-in-this-video%2C-we%27ll"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from In this video, we'll discuss" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In this video, we'll discuss </span></div><div aria-label="toggle video from packet sniffing, with a focus on how" class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">packet sniffing, with a focus on how </span></div><div aria-label="toggle video from threat actors may use this technique to" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">threat actors may use this technique to </span></div><div aria-label="toggle video from gain unauthorized access to information." class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">gain unauthorized access to information. </span></div><div aria-label="toggle video from Previously, you learned about" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Previously, you learned about </span></div><div aria-label="toggle video from the information and data packets" class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the information and data packets </span></div><div aria-label="toggle video from that travel across the network." class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that travel across the network. </span></div><div aria-label="toggle video from Packets include a header which contains" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Packets include a header which contains </span></div><div aria-label="toggle video from the sender's and receiver's IP addresses." class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the sender's and receiver's IP addresses. </span></div><div aria-label="toggle video from Packets also contain a body, which" class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Packets also contain a body, which </span></div><div aria-label="toggle video from may contain valuable information like names," class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">may contain valuable information like names, </span></div><div aria-label="toggle video from date of birth, personal messages," class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">date of birth, personal messages, </span></div><div aria-label="toggle video from financial information, and credit card numbers." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">financial information, and credit card numbers. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-packet-sniffing-is-t"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Packet sniffing is the practice of using" class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Packet sniffing is the practice of using </span></div><div aria-label="toggle video from software tools to observe" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">software tools to observe </span></div><div aria-label="toggle video from data as it moves across a network." class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">data as it moves across a network. </span></div><div aria-label="toggle video from As a security analyst," class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">As a security analyst, </span></div><div aria-label="toggle video from you may use packet sniffing to analyze and capture" class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">you may use packet sniffing to analyze and capture </span></div><div aria-label="toggle video from packets when investigating ongoing incidents" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">packets when investigating ongoing incidents </span></div><div aria-label="toggle video from or debugging network issues." class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">or debugging network issues. </span></div><div aria-label="toggle video from Later in this certificate program," class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Later in this certificate program, </span></div><div aria-label="toggle video from current lecture segment: you'll gain hands-on practice" class="rc-Phrase active css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">you'll gain hands-on practice </span></div><div aria-label="toggle video from with some packet sniffing software." class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">with some packet sniffing software. </span></div><div aria-label="toggle video from However, malicious actors may also use" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">However, malicious actors may also use </span></div><div aria-label="toggle video from packet sniffing to look at" class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">packet sniffing to look at </span></div><div aria-label="toggle video from data that has not been sent to them." class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">data that has not been sent to them. </span></div><div aria-label="toggle video from This is a little bit like opening somebody else's mail." class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This is a little bit like opening somebody else's mail. </span></div><div aria-label="toggle video from It's important for you to learn about how" class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It's important for you to learn about how </span></div><div aria-label="toggle video from threat actors use packet sniffing" class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">threat actors use packet sniffing </span></div><div aria-label="toggle video from with harmful intent so you can be" class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">with harmful intent so you can be </span></div><div aria-label="toggle video from prepared to protect against these malicious acts." class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">prepared to protect against these malicious acts. </span></div><div aria-label="toggle video from Malicious actors may insert themselves in the middle of" class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Malicious actors may insert themselves in the middle of </span></div><div aria-label="toggle video from an authorized connection between two devices." class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">an authorized connection between two devices. </span></div><div aria-label="toggle video from Then they can use packet sniffing to spy on" class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Then they can use packet sniffing to spy on </span></div><div aria-label="toggle video from every data packet as it comes across their device." class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">every data packet as it comes across their device. </span></div><div aria-label="toggle video from The goal is to find valuable information in" class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The goal is to find valuable information in </span></div><div aria-label="toggle video from the data packets that they can" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the data packets that they can </span></div><div aria-label="toggle video from then use to their advantage." class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">then use to their advantage. </span></div><div aria-label="toggle video from Attackers can use software applications" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Attackers can use software applications </span></div><div aria-label="toggle video from or a hardware device to look into data packets." class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">or a hardware device to look into data packets. </span></div><div aria-label="toggle video from Malicious actors can access a network packet with" class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Malicious actors can access a network packet with </span></div><div aria-label="toggle video from a packet sniffer and make changes to the data." class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a packet sniffer and make changes to the data. </span></div><div aria-label="toggle video from They may change the information" class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">They may change the information </span></div><div aria-label="toggle video from in the body of the packet," class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">in the body of the packet, </span></div><div aria-label="toggle video from like altering a recipient's bank account number." class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">like altering a recipient's bank account number. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-packet-sniffing-can-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Packet sniffing can be passive or active." class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Packet sniffing can be passive or active. </span></div><div aria-label="toggle video from Passive packet sniffing is a type of" class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Passive packet sniffing is a type of </span></div><div aria-label="toggle video from attack where data packets are read in transit." class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">attack where data packets are read in transit. </span></div><div aria-label="toggle video from Since all the traffic on a network" class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Since all the traffic on a network </span></div><div aria-label="toggle video from is visible to any host on the hub," class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">is visible to any host on the hub, </span></div><div aria-label="toggle video from malicious actors can view" class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">malicious actors can view </span></div><div aria-label="toggle video from all the information going" class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">all the information going </span></div><div aria-label="toggle video from in and out of the device they are targeting." class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">in and out of the device they are targeting. </span></div><div aria-label="toggle video from Thinking back to the example of a letter being delivered," class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Thinking back to the example of a letter being delivered, </span></div><div aria-label="toggle video from we can compare a passive packet sniffing" class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">we can compare a passive packet sniffing </span></div><div aria-label="toggle video from attack to a postal delivery person" class="rc-Phrase css-ugczj4" data-cue="56" data-cue-index="55" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">attack to a postal delivery person </span></div><div aria-label="toggle video from maliciously reading somebody's mail." class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">maliciously reading somebody's mail. </span></div><div aria-label="toggle video from The postal worker, or packet" class="rc-Phrase css-ugczj4" data-cue="58" data-cue-index="57" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The postal worker, or packet </span></div><div aria-label="toggle video from sniffer, has the right to deliver the mail," class="rc-Phrase css-ugczj4" data-cue="59" data-cue-index="58" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">sniffer, has the right to deliver the mail, </span></div><div aria-label="toggle video from but not the right to read the information inside." class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">but not the right to read the information inside. </span></div><div aria-label="toggle video from Active packet sniffing is a type of" class="rc-Phrase css-ugczj4" data-cue="61" data-cue-index="60" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Active packet sniffing is a type of </span></div><div aria-label="toggle video from attack where data packets are manipulated in transit." class="rc-Phrase css-ugczj4" data-cue="62" data-cue-index="61" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">attack where data packets are manipulated in transit. </span></div><div aria-label="toggle video from This may include injecting" class="rc-Phrase css-ugczj4" data-cue="63" data-cue-index="62" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This may include injecting </span></div><div aria-label="toggle video from internet protocols to redirect the packets to" class="rc-Phrase css-ugczj4" data-cue="64" data-cue-index="63" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">internet protocols to redirect the packets to </span></div><div aria-label="toggle video from an unintended port or" class="rc-Phrase css-ugczj4" data-cue="65" data-cue-index="64" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">an unintended port or </span></div><div aria-label="toggle video from changing the information the packet contains." class="rc-Phrase css-ugczj4" data-cue="66" data-cue-index="65" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">changing the information the packet contains. </span></div><div aria-label="toggle video from Active packet sniffing attack would" class="rc-Phrase css-ugczj4" data-cue="67" data-cue-index="66" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Active packet sniffing attack would </span></div><div aria-label="toggle video from be like a neighbor telling the delivery person" class="rc-Phrase css-ugczj4" data-cue="68" data-cue-index="67" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">be like a neighbor telling the delivery person </span></div><div aria-label="toggle video from "I'll deliver that mail for you," and then reading the mail" class="rc-Phrase css-ugczj4" data-cue="69" data-cue-index="68" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">"I'll deliver that mail for you," and then reading the mail </span></div><div aria-label="toggle video from or changing the letter before putting it in your mailbox." class="rc-Phrase css-ugczj4" data-cue="70" data-cue-index="69" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">or changing the letter before putting it in your mailbox. </span></div><div aria-label="toggle video from Even though your neighbor knows you" class="rc-Phrase css-ugczj4" data-cue="71" data-cue-index="70" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Even though your neighbor knows you </span></div><div aria-label="toggle video from and even if they deliver it to the correct house," class="rc-Phrase css-ugczj4" data-cue="72" data-cue-index="71" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and even if they deliver it to the correct house, </span></div><div aria-label="toggle video from they are actively going out of" class="rc-Phrase css-ugczj4" data-cue="73" data-cue-index="72" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">they are actively going out of </span></div><div aria-label="toggle video from their way to engage in malicious behavior." class="rc-Phrase css-ugczj4" data-cue="74" data-cue-index="73" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">their way to engage in malicious behavior. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-the-good-news-is-tha"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from The good news is that" class="rc-Phrase css-ugczj4" data-cue="75" data-cue-index="74" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The good news is that </span></div><div aria-label="toggle video from malicious packet sniffing can be prevented." class="rc-Phrase css-ugczj4" data-cue="76" data-cue-index="75" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">malicious packet sniffing can be prevented. </span></div><div aria-label="toggle video from Let's look at a few ways" class="rc-Phrase css-ugczj4" data-cue="77" data-cue-index="76" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's look at a few ways </span></div><div aria-label="toggle video from the network security professional" class="rc-Phrase css-ugczj4" data-cue="78" data-cue-index="77" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the network security professional </span></div><div aria-label="toggle video from can prevent these attacks." class="rc-Phrase css-ugczj4" data-cue="79" data-cue-index="78" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">can prevent these attacks. </span></div><div aria-label="toggle video from One way to protect against" class="rc-Phrase css-ugczj4" data-cue="80" data-cue-index="79" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">One way to protect against </span></div><div aria-label="toggle video from malicious packet sniffing is to use" class="rc-Phrase css-ugczj4" data-cue="81" data-cue-index="80" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">malicious packet sniffing is to use </span></div><div aria-label="toggle video from a VPN to encrypt and protect" class="rc-Phrase css-ugczj4" data-cue="82" data-cue-index="81" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a VPN to encrypt and protect </span></div><div aria-label="toggle video from data as it travels across the network." class="rc-Phrase css-ugczj4" data-cue="83" data-cue-index="82" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">data as it travels across the network. </span></div><div aria-label="toggle video from If you don't remember how VPNs work," class="rc-Phrase css-ugczj4" data-cue="84" data-cue-index="83" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">If you don't remember how VPNs work, </span></div><div aria-label="toggle video from you can revisit the video about" class="rc-Phrase css-ugczj4" data-cue="85" data-cue-index="84" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">you can revisit the video about </span></div><div aria-label="toggle video from this topic in the previous section of the program." class="rc-Phrase css-ugczj4" data-cue="86" data-cue-index="85" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">this topic in the previous section of the program. </span></div><div aria-label="toggle video from When you use a VPN," class="rc-Phrase css-ugczj4" data-cue="87" data-cue-index="86" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">When you use a VPN, </span></div><div aria-label="toggle video from hackers might interfere with your traffic," class="rc-Phrase css-ugczj4" data-cue="88" data-cue-index="87" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">hackers might interfere with your traffic, </span></div><div aria-label="toggle video from but they won't be able to decode it" class="rc-Phrase css-ugczj4" data-cue="89" data-cue-index="88" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">but they won't be able to decode it </span></div><div aria-label="toggle video from to read it and read your private information." class="rc-Phrase css-ugczj4" data-cue="90" data-cue-index="89" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to read it and read your private information. </span></div><div aria-label="toggle video from Another way to add a layer of" class="rc-Phrase css-ugczj4" data-cue="91" data-cue-index="90" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Another way to add a layer of </span></div><div aria-label="toggle video from protection against packet sniffing is to make sure" class="rc-Phrase css-ugczj4" data-cue="92" data-cue-index="91" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">protection against packet sniffing is to make sure </span></div><div aria-label="toggle video from that websites you have use" class="rc-Phrase css-ugczj4" data-cue="93" data-cue-index="92" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that websites you have use </span></div><div aria-label="toggle video from HTTPS at the beginning of the domain address." class="rc-Phrase css-ugczj4" data-cue="94" data-cue-index="93" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">HTTPS at the beginning of the domain address. </span></div><div aria-label="toggle video from Previously, we discussed how HTTPS uses SSL/TLS to" class="rc-Phrase css-ugczj4" data-cue="95" data-cue-index="94" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Previously, we discussed how HTTPS uses SSL/TLS to </span></div><div aria-label="toggle video from encrypt data and prevent eavesdropping" class="rc-Phrase css-ugczj4" data-cue="96" data-cue-index="95" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">encrypt data and prevent eavesdropping </span></div><div aria-label="toggle video from when malicious actors spy on network transmissions." class="rc-Phrase css-ugczj4" data-cue="97" data-cue-index="96" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">when malicious actors spy on network transmissions. </span></div><div aria-label="toggle video from One final way to help protect yourself against" class="rc-Phrase css-ugczj4" data-cue="98" data-cue-index="97" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">One final way to help protect yourself against </span></div><div aria-label="toggle video from malicious packet sniffing is to" class="rc-Phrase css-ugczj4" data-cue="99" data-cue-index="98" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">malicious packet sniffing is to </span></div><div aria-label="toggle video from avoid using unprotected WiFi." class="rc-Phrase css-ugczj4" data-cue="100" data-cue-index="99" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">avoid using unprotected WiFi. </span></div><div aria-label="toggle video from You usually find unprotected WiFi in" class="rc-Phrase css-ugczj4" data-cue="101" data-cue-index="100" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You usually find unprotected WiFi in </span></div><div aria-label="toggle video from public places like coffee shops," class="rc-Phrase css-ugczj4" data-cue="102" data-cue-index="101" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">public places like coffee shops, </span></div><div aria-label="toggle video from restaurants, or airports." class="rc-Phrase css-ugczj4" data-cue="103" data-cue-index="102" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">restaurants, or airports. </span></div><div aria-label="toggle video from These networks don't use encryption." class="rc-Phrase css-ugczj4" data-cue="104" data-cue-index="103" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">These networks don't use encryption. </span></div><div aria-label="toggle video from This means that anyone on the network can access" class="rc-Phrase css-ugczj4" data-cue="105" data-cue-index="104" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This means that anyone on the network can access </span></div><div aria-label="toggle video from all of the data traveling to and from your device." class="rc-Phrase css-ugczj4" data-cue="106" data-cue-index="105" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">all of the data traveling to and from your device. </span></div><div aria-label="toggle video from One precaution you can take is avoiding" class="rc-Phrase css-ugczj4" data-cue="107" data-cue-index="106" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">One precaution you can take is avoiding </span></div><div aria-label="toggle video from free public WiFi unless you have" class="rc-Phrase css-ugczj4" data-cue="108" data-cue-index="107" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">free public WiFi unless you have </span></div><div aria-label="toggle video from a VPN service already installed on your device." class="rc-Phrase css-ugczj4" data-cue="109" data-cue-index="108" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a VPN service already installed on your device. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--3"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-now-you-know-how-thr"><div aria-label="toggle video from Now you know how threat actors may use" class="rc-Phrase css-ugczj4" data-cue="110" data-cue-index="109" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now you know how threat actors may use </span></div><div aria-label="toggle video from packet sniffing and how to" class="rc-Phrase css-ugczj4" data-cue="111" data-cue-index="110" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">packet sniffing and how to </span></div><div aria-label="toggle video from protect a network from these attacks." class="rc-Phrase css-ugczj4" data-cue="112" data-cue-index="111" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">protect a network from these attacks. </span></div><div aria-label="toggle video from Let's move on to discuss other network intrusions." class="rc-Phrase css-ugczj4" data-cue="113" data-cue-index="112" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's move on to discuss other network intrusions. </span></div></div>

# IP Spoofing

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-next%2C-let%27s-learn-ab"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Next, let's learn about" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Next, let's learn about </span></div><div aria-label="toggle video from another kind of network attack called IP spoofing." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">another kind of network attack called IP spoofing. </span></div><div aria-label="toggle video from IP spoofing is a network attack" class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">IP spoofing is a network attack </span></div><div aria-label="toggle video from performed when an attacker changes the source IP of" class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">performed when an attacker changes the source IP of </span></div><div aria-label="toggle video from a data packet to impersonate" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a data packet to impersonate </span></div><div aria-label="toggle video from an authorized system and gain access to a network." class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">an authorized system and gain access to a network. </span></div><div aria-label="toggle video from In this kind of attack," class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">In this kind of attack, </span></div><div aria-label="toggle video from the hacker is pretending to be someone they are" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the hacker is pretending to be someone they are </span></div><div aria-label="toggle video from not so they can communicate over" class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">not so they can communicate over </span></div><div aria-label="toggle video from the network with the target computer and get" class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the network with the target computer and get </span></div><div aria-label="toggle video from past firewall rules that may prevent outside traffic." class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">past firewall rules that may prevent outside traffic. </span></div><div aria-label="toggle video from Some common IP spoofing attacks are on-path attacks," class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Some common IP spoofing attacks are on-path attacks, </span></div><div aria-label="toggle video from replay attacks, and smurf attacks." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">replay attacks, and smurf attacks. </span></div><div aria-label="toggle video from Let's discuss these one at a time." class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's discuss these one at a time. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-an-on-path-attack-is"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from An on-path attack is" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">An on-path attack is </span></div><div aria-label="toggle video from an attack where the malicious actor places themselves in" class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">an attack where the malicious actor places themselves in </span></div><div aria-label="toggle video from the middle of an authorized connection" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the middle of an authorized connection </span></div><div aria-label="toggle video from and intercepts or alters the data in transit." class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and intercepts or alters the data in transit. </span></div><div aria-label="toggle video from On-path attackers gain access to" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">On-path attackers gain access to </span></div><div aria-label="toggle video from the network and put themselves between two devices," class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the network and put themselves between two devices, </span></div><div aria-label="toggle video from like a web browser and a web server." class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">like a web browser and a web server. </span></div><div aria-label="toggle video from Then they sniff the packet" class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Then they sniff the packet </span></div><div aria-label="toggle video from information to learn the IP and" class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">information to learn the IP and </span></div><div aria-label="toggle video from MAC addresses to devices" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">MAC addresses to devices </span></div><div aria-label="toggle video from that are communicating with each other." class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">that are communicating with each other. </span></div><div aria-label="toggle video from After they have this information," class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">After they have this information, </span></div><div aria-label="toggle video from they can pretend to be either of these devices." class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">they can pretend to be either of these devices. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-another-type-of-atta"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Another type of attack is a replay attack." class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Another type of attack is a replay attack. </span></div><div aria-label="toggle video from A replay attack is" class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A replay attack is </span></div><div aria-label="toggle video from a network attack performed when" class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a network attack performed when </span></div><div aria-label="toggle video from a malicious actor intercepts" class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a malicious actor intercepts </span></div><div aria-label="toggle video from a data packet in transit and delays" class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a data packet in transit and delays </span></div><div aria-label="toggle video from it or repeats it at another time." class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">it or repeats it at another time. </span></div><div aria-label="toggle video from A delayed packet can cause" class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A delayed packet can cause </span></div><div aria-label="toggle video from connection issues between target computers," class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">connection issues between target computers, </span></div><div aria-label="toggle video from or a malicious actor may take" class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">or a malicious actor may take </span></div><div aria-label="toggle video from a network transmission that was sent by" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a network transmission that was sent by </span></div><div aria-label="toggle video from an authorized user and repeat it at" class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">an authorized user and repeat it at </span></div><div aria-label="toggle video from a later time to impersonate the authorized user." class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a later time to impersonate the authorized user. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-a-smurf-attack-is-a-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from A smurf attack is a combination of" class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A smurf attack is a combination of </span></div><div aria-label="toggle video from a DDoS attack and an IP spoofing attack." class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a DDoS attack and an IP spoofing attack. </span></div><div aria-label="toggle video from The attacker sniffs an authorized user's IP address" class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">The attacker sniffs an authorized user's IP address </span></div><div aria-label="toggle video from and floods it with packets." class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and floods it with packets. </span></div><div aria-label="toggle video from current lecture segment: This overwhelms the target computer and can" class="rc-Phrase active css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">This overwhelms the target computer and can </span></div><div aria-label="toggle video from bring down a server or the entire network." class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">bring down a server or the entire network. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--3"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-now-that-you%27ve-lear"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Now that you've learned about" class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now that you've learned about </span></div><div aria-label="toggle video from different kinds of IP spoofing," class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">different kinds of IP spoofing, </span></div><div aria-label="toggle video from let's talk about how you can protect" class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">let's talk about how you can protect </span></div><div aria-label="toggle video from the network from this kind of attack." class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the network from this kind of attack. </span></div><div aria-label="toggle video from As you previously learned," class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">As you previously learned, </span></div><div aria-label="toggle video from encryption should always be implemented so that the data" class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">encryption should always be implemented so that the data </span></div><div aria-label="toggle video from in your network transfers can't" class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">in your network transfers can't </span></div><div aria-label="toggle video from be read by malicious actors." class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">be read by malicious actors. </span></div><div aria-label="toggle video from Firewalls can be configured" class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Firewalls can be configured </span></div><div aria-label="toggle video from to protect against IP spoofing." class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to protect against IP spoofing. </span></div><div aria-label="toggle video from IP spoofing makes it seem like" class="rc-Phrase css-ugczj4" data-cue="56" data-cue-index="55" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">IP spoofing makes it seem like </span></div><div aria-label="toggle video from the malicious actor is an authorized user" class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the malicious actor is an authorized user </span></div><div aria-label="toggle video from by changing the sender's address of" class="rc-Phrase css-ugczj4" data-cue="58" data-cue-index="57" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">by changing the sender's address of </span></div><div aria-label="toggle video from the data packet to match the target network's address." class="rc-Phrase css-ugczj4" data-cue="59" data-cue-index="58" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the data packet to match the target network's address. </span></div><div aria-label="toggle video from So if a firewall receives a data packet from the internet" class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">So if a firewall receives a data packet from the internet </span></div><div aria-label="toggle video from where the sender's IP address" class="rc-Phrase css-ugczj4" data-cue="61" data-cue-index="60" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">where the sender's IP address </span></div><div aria-label="toggle video from is the same as the private network," class="rc-Phrase css-ugczj4" data-cue="62" data-cue-index="61" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">is the same as the private network, </span></div><div aria-label="toggle video from then the firewall will deny the transmission" class="rc-Phrase css-ugczj4" data-cue="63" data-cue-index="62" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">then the firewall will deny the transmission </span></div><div aria-label="toggle video from since all the devices with that IP address" class="rc-Phrase css-ugczj4" data-cue="64" data-cue-index="63" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">since all the devices with that IP address </span></div><div aria-label="toggle video from should already be on the local network." class="rc-Phrase css-ugczj4" data-cue="65" data-cue-index="64" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">should already be on the local network. </span></div><div aria-label="toggle video from You can make sure that your firewalls" class="rc-Phrase css-ugczj4" data-cue="66" data-cue-index="65" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You can make sure that your firewalls </span></div><div aria-label="toggle video from configure correctly by creating a rule to" class="rc-Phrase css-ugczj4" data-cue="67" data-cue-index="66" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">configure correctly by creating a rule to </span></div><div aria-label="toggle video from reject all incoming traffic that has" class="rc-Phrase css-ugczj4" data-cue="68" data-cue-index="67" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">reject all incoming traffic that has </span></div><div aria-label="toggle video from the same IP address as the local network." class="rc-Phrase css-ugczj4" data-cue="69" data-cue-index="68" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the same IP address as the local network. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--4"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-that%27s-it-for-ip-spo"><div aria-label="toggle video from That's it for IP spoofing." class="rc-Phrase css-ugczj4" data-cue="70" data-cue-index="69" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">That's it for IP spoofing. </span></div><div aria-label="toggle video from You've learned how IP spoofing is used in" class="rc-Phrase css-ugczj4" data-cue="71" data-cue-index="70" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You've learned how IP spoofing is used in </span></div><div aria-label="toggle video from some common attacks like on-path attacks," class="rc-Phrase css-ugczj4" data-cue="72" data-cue-index="71" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">some common attacks like on-path attacks, </span></div><div aria-label="toggle video from replay attacks, and smurf attacks." class="rc-Phrase css-ugczj4" data-cue="73" data-cue-index="72" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">replay attacks, and smurf attacks. </span></div></div>

# Overview of interception tactics

In the previous course items, you learned how packet sniffing and IP spoofing are used in network attacks. Because these attacks intercept data packets as they travel across the network, they are called interception attacks.

This reading will introduce you to some specific attacks that use packet sniffing and IP spoofing. You will learn how hackers use these tactics and how security analysts can counter the threat of interception attacks.

## A closer review of packet sniffing 

As you learned in a previous video, **packet sniffing** is the practice of capturing and inspecting data packets across a network. On a private network, data packets are directed to the matching destination device on the network.

The device’s **Network Interface Card** **(NIC)** is a piece of hardware that connects the device to a network. The NIC reads the data transmission, and if it contains the device’s MAC address, it accepts the packet and sends it to the device to process the information based on the protocol. This occurs in all standard network operations. However, a NIC can be set to promiscuous mode, which means that it accepts all traffic on the network, even the packets that aren’t addressed to the NIC’s device. You’ll learn more about NIC’s later in the program. Malicious actors might use software like Wireshark to capture the data on a private network and store it for later use. They can then use the personal information to their own advantage. Alternatively, they might use the IP and MAC addresses of authorized users of the private network to perform IP spoofing.

## A closer review of IP spoofing 

After a malicious actor has sniffed packets on the network, they can impersonate the IP and MAC addresses of authorized devices to perform an IP spoofing attack. Firewalls can prevent IP spoofing attacks by configuring it to refuse unauthorized IP packets and suspicious traffic. Next, you’ll examine a few common IP spoofing attacks that are important to be familiar with as a security analyst.

### **On-path attack**

An **on-path attack** happens when a hacker intercepts the communication between two devices or servers that have a trusted relationship. The transmission between these two trusted network devices could contain valuable information like usernames and passwords that the malicious actor can collect. An on-path attack is sometimes referred to as a **meddler-in-the middle attack** because the hacker is hiding in the middle of communications between two trusted parties.

Or, it could be that the intercepted transmission contains a DNS system look-up. You’ll recall from an earlier video that a DNS server translates website domain names into IP addresses. If a malicious actor intercepts a transmission containing a DNS lookup, they could spoof the DNS response from the server and redirect a domain name to a different IP address, perhaps one that contains malicious code or other threats. The most important way to protect against an on-path attack is to encrypt your data in transit, e.g. using TLS.

### **Smurf attack**

A **smurf attack** is a network attack that is performed when an attacker sniffs an authorized user’s IP address and floods it with packets. Once the spoofed packet reaches the broadcast address, it is sent to all of the devices and servers on the network.

In a smurf attack, IP spoofing is combined with another denial of service (DoS) technique to flood the network with unwanted traffic. For example, the spoofed packet could include an Internet Control Message Protocol (ICMP) ping. As you learned earlier, ICMP is used to troubleshoot a network. But if too many ICMP messages are transmitted, the ICMP echo responses overwhelm the servers on the network and they shut down. This creates a denial of service and can bring an organization’s operations to a halt.

An important way to protect against a smurf attack is to use an advanced firewall that can monitor any unusual traffic on the network. Most next generation firewalls (NGFW) include features that detect network anomalies to ensure that oversized broadcasts are detected before they have a chance to bring down the network.

### **DoS attack**

As you’ve learned, once the malicious actor has sniffed the network traffic, they can impersonate an authorized user. A **Denial of Service attack** is a class of attacks where the attacker prevents the compromised system from performing legitimate activity or responding to legitimate traffic. Unlike IP spoofing, however, the attacker will not receive a response from the targeted host. Everything about the data packet is authorized including the IP address in the header of the packet. In IP spoofing attacks, the malicious actor uses IP packets containing fake IP addresses. The attackers keep sending IP packets containing fake IP addresses until the network server crashes.

**Pro Tip**: Remember the principle of defense-in-depth. There isn’t one perfect strategy for stopping each kind of attack. You can layer your defense by using multiple strategies. In this case, using industry standard encryption will strengthen your security and help you defend from DoS attacks on more than one level.

## Key takeaways

This reading covered several types of common IP spoofing attacks. You learned about how packet sniffing is performed and how gathering information from intercepting data transmissions can give malicious actors opportunities for IP spoofing. Whether it is an on-path attack, IP spoofing attack, or a smurf attack, analysts need to ensure that mitigation strategies are in place to limit the threat and prevent security breaches.

# Glossary terms from week 3 & wrap-up

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-nice-job-finishing-t"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Nice job finishing this section!" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Nice job finishing this section! </span></div><div aria-label="toggle video from Let's review what you've learned so far." class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Let's review what you've learned so far. </span></div><div aria-label="toggle video from We discussed how to secure networks." class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">We discussed how to secure networks. </span></div><div aria-label="toggle video from We also learned about network intrusion tactics" class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">We also learned about network intrusion tactics </span></div><div aria-label="toggle video from like malicious packet sniffing and IP spoofing." class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">like malicious packet sniffing and IP spoofing. </span></div><div aria-label="toggle video from Finally, we discussed how" class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Finally, we discussed how </span></div><div aria-label="toggle video from a security analyst can protect against these attacks." class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">a security analyst can protect against these attacks. </span></div><div aria-label="toggle video from current lecture segment: You've learned about DoS and DDoS" class="rc-Phrase active css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">You've learned about DoS and DDoS </span></div><div aria-label="toggle video from attacks like ICMP flooding, SYN attacks," class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">attacks like ICMP flooding, SYN attacks, </span></div><div aria-label="toggle video from and the ping of death," class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and the ping of death, </span></div><div aria-label="toggle video from which try to overwhelming a network by" class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">which try to overwhelming a network by </span></div><div aria-label="toggle video from flooding it with unwanted data packets." class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">flooding it with unwanted data packets. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="phrases" id="bkmrk-now%2C-just-think-abou"><div aria-label="toggle video from Now, just think about everything you" class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Now, just think about everything you </span></div><div aria-label="toggle video from know already about network attacks." class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">know already about network attacks. </span></div><div aria-label="toggle video from What you've learned in these videos will be" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">What you've learned in these videos will be </span></div><div aria-label="toggle video from essential in your work as a security analyst." class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">essential in your work as a security analyst. </span></div><div aria-label="toggle video from Coming up, you'll learn" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Coming up, you'll learn </span></div><div aria-label="toggle video from about how security analysts can protect" class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">about how security analysts can protect </span></div><div aria-label="toggle video from the network using various security hardening techniques." class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the network using various security hardening techniques.   
</span></div></div>## Terms and definitions from Course 3, Week 3

**Active packet sniffing:** A type of attack where data packets are manipulated in transit

**Botnet:** A collection of computers infected by malware that are under the control of a single threat actor, known as the “bot-herder"

**Denial of service (DoS) attack:** An attack that targets a network or server and floods it with network traffic

**Distributed denial of service (DDoS) attack:** A type of denial or service attack that uses multiple devices or servers located in different locations to flood the target network with unwanted traffic

**Internet Control Message Protocol (ICMP):** An internet protocol used by devices to tell each other about data transmission errors across the network

**Internet Control Message Protocol (ICMP) flood:** A type of DoS attack performed by an attacker repeatedly sending ICMP request packets to a network server

**IP spoofing:** A network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network

**Network Interface Card (NIC):** Hardware that connects computers to a network

**On-path attack:** An attack where a malicious actor places themselves in the middle of an authorized connection and intercepts or alters the data in transit

**Packet sniffing:** The practice of capturing and inspecting data packets across a network

**Passive packet sniffing:** A type of attack where a malicious actor connects to a network hub and looks at all traffic on the network

**Ping of death:** A type of DoS attack caused when a hacker pings a system by sending it an oversized ICMP packet that is bigger than 64KB

**Replay attack:** A network attack performed when a malicious actor intercepts a data packet in transit and delays it or repeats it at another time

**Smurf attack:** A network attack performed when an attacker sniffs an authorized user’s IP address and floods it with ICMP packets

**Synchronize (SYN) flood attack:** A type of DoS attack that simulates a TCP/IP connection and floods a server with SYN packets

<div class="phrases" id="bkmrk--1"><div aria-label="toggle video from the network using various security hardening techniques." class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">  
</span></div></div>