Network Attacks
/ Update
1 min read
Network-based vulnerabilities and exploits can be catastrophic because of the types of damage and impact they can cause in an organization. The following are some examples of network-based attacks and exploits:
- Windows name resolution-based attacks and exploits
- Attacks and exploits against Server Message Block implementations
- DNS cache poisoning attacks
- Simple Network Management Protocol vulnerabilities and exploits
- Simple Mail Transfer Protocol SMTP vulnerabilities and exploits
- File Transfer Protocol FTP - vulnerabilities and exploits
- Pass-the-Hash Attacks
- Kerberos and LDAP-Based Attacks
- On-path attacks (previously known as man-in-the-middle MITM or On-Path Attacks )
- SSL stripping attacks
- Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks - DoS and DDoS Attacks
- NAC bypass
- Virtual local area network - VLAN Hopping attacks
- DHCP Attacks
Network Attacks
https://nahil.xyz/vault/vulns-attacks/network-attacks/
Author Nahil Rasheed
Published at October 9, 2025
Copyright
CC BY-NC-SA 4.0
Disclaimer This content is provided strictly for educational purposes only.