CS458 Lecture Notes - Lecture 4: Dns Spoofing, Web Server, Local Area Network

57 views65 pages

Document Summary

Slide adapted from computer networking by kurose & ross. Client: transport and network layer designed in the 1970s to connect local networks at di erent universities and research labs, participants knew and trusted each other, design addressed non-malicious errors (e. g. , packet drops), but not malicious errors. Eavesdropping and wiretapping: owner of node can always monitor communication. Communication media (cont. : wifi, can be easily intercepted by anyone with a. Spoo ng: object (node, person, url, web page, email, wifi access point,. masquerades as another one, url spoo ng, exploit typos: www. uwaterlo. ca, exploit ambiguities: www. foobar. com or www. foo-bar. com, exploit similarities: www. paypa1. com, web page spoo ng and url spoo ng are used in. Phishing attacks: evil twin attack for wifi access points, spoo ng is also used in session hijacking and man-in-the-middle attacks. 4-17: sometimes, the mere existence of communication between two parties is sensitive and should be hidden.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents