MikroTik Port Scan Attack and Prevention

Attackers use port scan attack to determine which ports on your router or on the network are open and available. By running a port scan attack on a router or on a network, the attacker will know which ports are open and are listening to information. Also, he can know...

MikroTik ICMP Smurf Attack & Prevention

Another type of attack that I would like to explore about it, is called ICMP Smurf attack. What happens in this attack is that the attacker will send a large amount of Internet Control Message Protocol (ICMP ping request) to the broadcast address of the network, and...

MikroTik UDP Flood Attack & Prevention

Similarly to what we have seen when I was speaking about TCP SYN flood attack, the attacker may use the same technique but this time to flood UDP traffic causing the MikroTik router to not be functional anymore. He will simply create and send a large amount of UDP...

MikroTik TCP SYN Attack & Prevention

I am sure that you, as a network engineer, already know how communication will start between 2 devices that want to use an application which run on TCP protocol. Some types of those applications are http, https, Telnet, SSH, and so on. If you can’t recall the 3-way...

MikroTik DHCP Rogue Attack

We are still talking about the different types of OSI Layer attacks, and now we have to discuss another type of attack which is the DHCP Rogue attack. This attack is so hard to detect. Any attacker, who is connected to our Layer 2 network which a Kali Linux machine...