Create an account



Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
The OSI Model

#1
You know it, you love but just in case, here it is...

The OSI Model

7. Application:  Used by end-user software such as web browsers and email clients. It provides protocols that allow software to send and receive information and present meaningful data to users.  A few examples of application layer protocols are HTTP, FTP, POP, SMTP, DNS. Examples of application layer attacks include DDoS attacks, HTTP floods, SQL injections, cross-site scripting, parameter tampering, and Slowloris attacks.

6. Presentation:  Prepares data for the application layer. It defines how two devices should encode, encrypt, and compress data so it is received correctly on the other end The most common types of attacks you'll see in this layer are SSL hijacking attacks, encryption attacks, encoding attacks, and sniffing attacks.

5. Session:  The session layer creates communication channels, called sessions, between devices.  Common attacks in the session layer include session hijacking and MITM (man-in-The-Middle) attacks, Spoofing and hijacking of data based on failed authentication attempts.

4. Transport: Takes data transferred in the session layer and breaks it into “segments” on transmitting end. Reassemble segments on the receiving end, turning it back into data that can be used by the session layer. The main threat at the Transport layer is port scanning. This attack seeks out open or unused network ports and exploits these weaknesses in order to access your data.

3. Network:   The layer has two main functions, breaking up segments into network packets, reassembling the packets on the receiving end. Routing packets by discovering the best path across a physical network & typically using IP addresses to route packets to a destination node. Attacks can be performed over the internet. There are more DoS attacks possible at this layer such as ping floods or ICMP attacks.

2. Data Link Establishes and terminates a connection between two physically-connected nodes on a network. It breaks up packets into frames and sends them from source to destination. This layer is composed of two parts LLC, which identifies network protocols,, and Media Access Control MAC. Attacks at the Data Link layer come from within the local network.  Data Link attacks may include MAC Flooding or ARP poisoning, which are usually a result of unhardened routers.

1. Physical:  The electrical and physical components of your system. These components include cables, routers, modems, and other physical requirements  Attacks at the physical layer are usually DoS, or Denial of Service, attacks. The goal of these attacks is to stop all network functions.


[attachment=8]


Attached Files Thumbnail(s)
   
Reply





Users browsing this thread:
1 Guest(s)

Forum software by © MyBB Theme © iAndrew 2016