Lecture 17: Low-Level Network Attacks

Eavesdropping




Spoofing


If an attacker spoofs a packet to a victim, where would the victim's reply be sent to?




On-path vs. Off-path Spoofing


Which type of attacker is more powerful: on-path, off-path, or neither is strictly stronger than the other?




ARP

Coming soon… Check back after the live lecture!

WPA

Coming soon… Check back after the live lecture!

DHCP


Which of the four messages in the DHCP handshake are broadcast? Why do we need to broadcast these?




DHCP Threats


What type(s) of attacker can execute an attack on DHCP, and what type of attacker do they become after successfully executing the attack?