Network Security Attacks Tutorial
This website presents a structured tutorial on network security attacks for undergraduate students. It is based on the uploaded lecture notes, but reorganized by attack family and learning path for easier study and cleaner GitHub Pages navigation.
How to study this site
- Start with Foundations.
- Move to TCP/IP, DNS, and Buffer Overflow to understand classic protocol and implementation weaknesses.
- Continue with Malware, Password Attacks, and Web Attacks.
- Finish with Botnets, Social Engineering, Mobile Security, Defensive Principles, and Labs.
Site Contents
- Foundations
- TCP/IP, Spoofing, and DoS
- DNS and Cache Poisoning
- Buffer Overflow
- Viruses and Worms
- Recon, Scanning, Sniffing, IDS
- Password Attacks
- Web Security Attacks
- P2P Security Issues
- Bots, Botnets, and DDoS
- Social Engineering and Trojans
- Mobile Device Security
- Defensive Principles
- Lab Roadmap
- Review Questions
Suggested reading sequence
- Foundations
- TCP/IP, spoofing, and denial of service
- DNS attacks
- Buffer overflow and memory corruption
- Malware and propagation
- Reconnaissance and scanning
- Password attacks
- Web attacks
- Botnets and DDoS
- Social engineering and trojans
- Mobile security
- Defensive principles
- Labs and review questions
Source notes
This tutorial was developed from the following uploaded lecture notes by Avi Kak, including lectures on TCP/IP DoS, DNS cache poisoning, buffer overflow, malware, scanning, password attacks, web attacks, botnets, social engineering, and mobile security.