Understanding network-based attacks
Throughout the course of this book, you have learned that threat actors focus on hacking, as a business, to steal data for financial gain. However, there are many threat actors who just want to see organizations burn, metaphorically speaking. Some threat actors hack for financial gain, some hack to steal data, while others hack for fun. Whatever the reason, their intentions are generally bad.
Hackers usually look for vulnerabilities within their target systems, whether the vulnerability exists within an application, operating system, or even within network protocols. Many network and security professionals commonly overlook network-based attacks. These types of attacks allow an attacker to exploit the vulnerabilities found within the TCP/IP protocol suite. During the initial development of TCP/IP, security was not even a concern as it is today. Over the years, as technologies and newer network protocols have been developed, many protocol developers...