Summary
In this chapter, you have explored common types of network-based attacks such as DDoS, botnets, on-path, and even DNS-based attacks. Additionally, you learned how hackers use various techniques to trick users on a wireless network into connecting to a rogue access point that’s owned and managed by the hacker. Lastly, you discovered how hackers can use social engineering to trick a person into revealing sensitive information or performing an action.
I hope this chapter has been informative for you and is helpful in your journey toward learning networking and becoming a network professional. In the next chapter, Chapter 16, Implementing Network Security, you will learn how to implement various network security solutions to mitigate various types of cyberattacks and threats.