Lecture 17: Low-Level Network Attacks
Eavesdropping
Spoofing
If an attacker spoofs a packet to a victim, where would the victim's reply be sent to?
On-path vs. Off-path Spoofing
Which type of attacker is more powerful: on-path, off-path, or neither is strictly stronger than the other?
ARP
Coming soon… Check back after the live lecture!
WPA
Coming soon… Check back after the live lecture!
DHCP
Which of the four messages in the DHCP handshake are broadcast? Why do we need to broadcast these?
DHCP Threats
What type(s) of attacker can execute an attack on DHCP, and what type of attacker do they become after successfully executing the attack?