You are on page 1of 2

The OSI (Open Systems Interconnection) model is a conceptual framework for

understanding how different components of a network communicate with each other.


The model is divided into seven layers, each with a specific function.

Here are some examples of attacks that can occur on each layer of the OSI model:

-Physical Layer: Attacks on the physical layer involve manipulating the physical
components of the network, such as cutting cables or disrupting power supplies. These
attacks can cause network downtime and prevent communication between devices.

-Data Link Layer: Attacks on the data link layer involve manipulating the data as it is
transmitted between devices. Examples include ARP spoofing, where an attacker sends
fake ARP messages to associate their MAC address with another device's IP address.

-Network Layer: Attacks on the network layer involve exploiting vulnerabilities in the
routing and addressing protocols used by the network. Examples include IP spoofing,
where an attacker sends packets with a fake source IP address to impersonate another
device, or denial-of-service (DoS) attacks, where an attacker floods a network with traffic
to overwhelm its resources and prevent legitimate traffic from getting through.

-Transport Layer: Attacks on the transport layer involve exploiting vulnerabilities in the
protocols used to establish and manage connections between devices. Examples
include SYN flood attacks, where an attacker sends a large number of connection
requests without completing the handshake process, or session hijacking, where an
attacker takes over an established session between two devices.

-Session Layer: Attacks on the session layer involve exploiting vulnerabilities in


the session management protocols used by the network. Examples include session
fixation, where an attacker sets the session ID for a victim's session before they log in, or
session hijacking, where an attacker takes over an established session between two
devices.

-Presentation Layer: Attacks on the presentation layer involve exploiting vulnerabilities


in the way that data is presented to the user. Examples include exploiting buffer
overflow vulnerabilities in applications that process user input, or phishing attacks that
trick users into entering sensitive information into fake websites.

-Application Layer: Attacks on the application layer involve exploiting vulnerabilities in


the applications themselves. Examples include SQL injection attacks that exploit
vulnerabilities in web applications to steal data or execute arbitrary code, or cross-site
scripting (XSS) attacks that allow attackers to inject malicious code into a website to
steal user data or control the victim's browser.
#osi #attacks

Activate to view larger image,

You might also like