Summary
In this chapter, we discussed network-based attacks, that is, attacks that target network resources in order to prevent users from using the network.
We examined two major types of attacks – those that simply load the network to the point that users are not able to use them, and the network protocol-based attacks that target basic network functionality, such as ARP and DHCP, in an attempt to prevent the network from functioning.
In this chapter, you learned how to use traffic-generation tools and tools that are used to generate attacks on Layer-2 and Layer-3 protocols. Additionally, you learned how to protect against them.
In the next chapter, we will learn about attacks on network devices, how to perform them, how to discover them, and how to defend against them.