Professional Documents
Culture Documents
NAME ID
1. BIKILA TESHOME………..…4337/20
2. ASRAT AKALU……………….
Serge Attack
In the field of computer security, a serge refers to a specific type of attack known
as a "man-in-the-middle" attack. This attack occurs when a malicious actor
intercepts and potentially alters communication between two parties without their
knowledge. The term "serge" is derived from the French word for "in the middle,"
which accurately describes the nature of this attack.
The attacker positions themselves between the sender and receiver of data,
allowing them to eavesdrop on the communication or even manipulate the
information being exchanged. Serge attacks can compromise the confidentiality,
integrity, and authenticity of the communication, making them particularly
dangerous.
4. Relaying: Attacker may relay modified communication to trick both parties into
believing they are communicating directly, or choose to eavesdrop without altering
the communication.
5. Attack Vectors: MitM attacks use methods like ARP spoofing, DNS spoofing,
Wi-Fi eavesdropping, SSL-stripping, and session hijacking to exploit
communication vulnerabilities.
1. Infection: The attacker distributes malware, often in the form of a virus, worm,
or Trojan, to infect a large number of computers or devices. These infected devices
are then remotely controlled by the attacker. The malware typically allows the
attacker to gain unauthorized access and control over the compromised devices.
4. Malicious Activities: Botnets can carry out malicious activities such as DDoS
attacks, spamming, theft of sensitive information, and crypto currency mining
using compromised devices.
5. Persistence and Updates: To maintain control over the botnet and evade
detection, the attacker may regularly update the malware and re-establish
communications with the compromised devices.