by Maher Haddad | May 29, 2023 | Firewall v7
Attackers use port scan attack to determine which ports on your router or on the network are open and available. By running a port scan attack on a router or on a network, the attacker will know which ports are open and are listening to information. Also, he can know...
by Maher Haddad | May 29, 2023 | Firewall v7
We are still discussing different types of attacks that we may encounter on our MikroTik router, and another attack that I would like to discuss about it is called: Password Brute Force Attack. The goal of this attack is to obtain credentials information such as a...
by Maher Haddad | May 29, 2023 | Firewall v7
Another type of attack that I would like to explore about it, is called ICMP Smurf attack. What happens in this attack is that the attacker will send a large amount of Internet Control Message Protocol (ICMP ping request) to the broadcast address of the network, and...
by Maher Haddad | May 29, 2023 | Firewall v7
Similarly to what we have seen when I was speaking about TCP SYN flood attack, the attacker may use the same technique but this time to flood UDP traffic causing the MikroTik router to not be functional anymore. He will simply create and send a large amount of UDP...
by Maher Haddad | May 29, 2023 | Firewall v7
I am sure that you, as a network engineer, already know how communication will start between 2 devices that want to use an application which run on TCP protocol. Some types of those applications are http, https, Telnet, SSH, and so on. If you can’t recall the 3-way...
by Maher Haddad | May 29, 2023 | Firewall v7
We are still talking about the different types of OSI Layer attacks, and now we have to discuss another type of attack which is the DHCP Rogue attack. This attack is so hard to detect. Any attacker, who is connected to our Layer 2 network which a Kali Linux machine...