Computer Security and Penetration Testing: Hacking Network Devices
Computer Security and Penetration Testing: Hacking Network Devices
Testing
Chapter 9
Hacking Network Devices
Objectives
• Identify the vulnerabilities of proxy servers
• Identify the vulnerabilities of routers and switches
• Identify the vulnerabilities of firewalls
• Identify the vulnerabilities of virtual private networks
(VPNs)
• Attacks groups:
– Attacks made upon proxy servers
– Attacks made through proxy servers
• Attacks made through proxy servers include
– Buffer overflow attacks
– Denial-of-service attacks
– Session-hijacking attacks
• Concealed identity
– Proxy servers hide a user’s real identity
– Hackers use this model to perform hacking operations
anonymously
– Hacker’s IP and time of attack is, however,
maintained on the proxy server
– Two ways to avoid this logging problem
• Hacker might use a chain of proxy servers
• Hacker can spoof the valid authentication details of a
network