8.4. Understanding and Defending against Hacker Attacks
You can view the interaction between a hacker and a network administrator in different ways. You can see a harmless game of cat and mouse or a terrorist attack on national security. In either case, a person attempts to break into or crash your system. You, as the network administrator, work at preventing and tracking the attacks.
In the following sections, you will learn about common network attacks and the techniques used to guard against them.
8.4.1. Hacker Tools: Common Network Attacks
Network attacks that are directed by a hacker are called directed attacks. For example, a Win-Nuke packet (generated by the WinNuke utility, discussed later in this chapter) sent by a hacker to a specific ...
Get Network+™: Study Guide, Fourth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.