ELI5: What are Network Attacks?

Think of computer networks like roads that connect buildings in a city. Network attacks are when bad guys mess with those roads — they might put up fake detour signs to redirect traffic, block the road so nobody can get through, or secretly listen in on conversations happening in passing cars. Every time your computer sends information to another computer, it travels along these “roads,” and attackers look for ways to intercept, redirect, or block that information before it reaches its destination.

Overview

Network attacks target the infrastructure, protocols, and communications that connect systems and users. These attacks exploit weaknesses in network protocols, configurations, and architectures to intercept data, disrupt services, or gain unauthorized access. Understanding network attacks is critical for the Security+ exam, as they represent fundamental threat categories that security controls are designed to mitigate.

Key Concepts

  • poisoning: Sending fake ARP messages to associate the attacker’s MAC address with a legitimate IP, enabling traffic interception
  • MAC flooding: Overwhelming a switch’s CAM table to force it into hub mode, broadcasting traffic to all ports
  • VLAN hopping: Exploiting trunk port configurations (switch spoofing or double tagging) to access traffic on other VLANs
  • Rogue DHCP server: Unauthorized DHCP server providing malicious gateway or DNS settings to clients
  • Evil twin: Setting up a fake wireless access point that mimics a legitimate one to intercept traffic
  • Deauthentication attack: Sending forged deauth frames to disconnect clients from a wireless network (802.11)
  • Replay attack: Capturing and retransmitting valid network traffic to gain unauthorized access or duplicate transactions
  • Amplification attack: Using protocols like DNS, NTP, or memcached to amplify a small request into a massive response directed at the victim
  • IP spoofing: Forging the source IP address of packets to impersonate another system or hide the attacker’s identity
  • Port scanning: Enumerating open ports and services on target systems (reconnaissance phase)
  • Bluejacking — sending unsolicited messages via Bluetooth (nuisance, not data theft)
  • Bluesnarfing — unauthorized access to data through Bluetooth connections (more serious than bluejacking)
  • Broadcast storm — excessive broadcast traffic overwhelming a network segment

Exam Tips

Remember

ARP poisoning = Layer 2 (data link). VLAN hopping = Layer 2. IP spoofing = Layer 3 (network). Port security, DHCP snooping, dynamic ARP inspection (DAI), and 802.1X are key Layer 2 defenses.

  • MAC flooding defense: port security with MAC address limits
  • VLAN hopping defense: disable auto-trunking, use a dedicated native VLAN
  • Replay attack defense: timestamps, nonces, and sequence numbers in protocols

Connections

  • denial-of-service attacks are a specific category of network attacks focused on disruption
  • on-path-attacks leverage ARP spoofing and similar techniques for traffic interception
  • dns-attacks target the name resolution infrastructure critical to network operations
  • network-monitoring detects anomalous traffic patterns that indicate network attacks in progress

Practice Questions

Scenario

See case-network-attacks for a practical DevOps scenario applying these concepts.