Access Aggregation Attacks (Passive attack)

Refers to an attack collecting multiple pieces of non-sensitive information and putting them together to learn sensitive information. Example: Reconnaissance attacks, in which you learn the IPs, open ports, running services, operating systems, etc.

Birthday Attacks (Brute-force attack)

Birthday attacks focus on finding collisions. Birthday refers to the birthday paradox:

If you have 377 people in a room you have a chance of 100% of having a birthday collision

If you have only 23 people, you still have a chance of 50%…

Use Hash Algorithms that are computational collision-free like SHA-3. And watch out for algorithms such as MD5, which has collisions.

Rainbow Table Attacks (Brute-force attack)

An issue you occur when trying to find a password, is you have to guess it, hash it and can only then compare it to the saved password hash. A rainbow table has a large database of precomputed hashes, which speeds up this process. A password cracker then compares all hashes from the rainbow table to hashes from stolen password databases.

Sniffer Attacks

Is when someone tracks packages sent over a network and tries to get information or data through this. (Using a packet tracer)

Techniques to prevent this:

Spoofing Attacks

Spoofing means to pretend to be someone or something.

An IP spoofing attack, means using another IP to pretend to be someone.

You can also spoof emails, phone numbers, etc.

Social Engineering Attacks