Network Security: Phishing & Password Cracking
In today’s age of computers and the prevalence of their use in our daily lives - both personal and professionally - it is more important than ever to make sure we safeguard our data. In our ping command exercise, we used the requests to test the number of packets sent across a network. “Normally, ping requests are used to test the connectivity of two computers by measuring the round-trip time from when an ICMP echo request is sent to when an ICMP echo reply is received.” (imperva, n.d., n.p.) Ping commands can also be used to launch a Denial of Service attack by overloading the target network with request packets, which consumes bandwidth and slows the target network considerably. To launch the attack, the attacker needs to know the target’s IP address and needs to have access to more bandwidth than the target network. Distributed Denial of Service attacks through a botnet work better just a ping flood alone as it is coming fro...