TCP/IP Vulnerabilities Layerwise

The TCP/IP model has multiple layers, and each has specific vulnerabilities that attackers can exploit.


1. Application Layer Vulnerabilities

  • Description: This is where applications and services operate (HTTP, FTP, DNS, SMTP, etc.).

  • Common Vulnerabilities:

    • Buffer Overflow: Malicious input overruns memory causing crashes or code execution.

    • Injection Attacks: SQL Injection, Command Injection targeting application logic.

    • Session Hijacking: Stealing or predicting session tokens.

    • DNS Spoofing/Cache Poisoning: Redirecting users to malicious sites by corrupting DNS data.

    • Email Spoofing: Faking sender’s address in SMTP to deliver phishing or spam.


2. Transport Layer Vulnerabilities

  • Description: Manages end-to-end communication (TCP, UDP).

  • Common Vulnerabilities:

    • TCP SYN Flood Attack: Exploits the TCP handshake by sending many SYN requests and never completing the handshake, exhausting server resources.

    • Session Hijacking: Intercepting or predicting sequence numbers to take over active TCP sessions.

    • UDP Flooding: Overwhelming a target with UDP packets, causing resource exhaustion.


3. Internet Layer Vulnerabilities

  • Description: Responsible for routing packets across networks (IP, ICMP).

  • Common Vulnerabilities:

    • IP Spoofing: Sending IP packets with a forged source IP address to hide attacker identity or bypass filters.

    • Smurf Attack: Using ICMP echo requests broadcasted to a network with the victim’s IP spoofed as the source, causing a flood of replies to the victim.

    • Fragmentation Attacks: Sending fragmented IP packets to evade detection or cause system crashes.


4. Network Interface Layer Vulnerabilities

  • Description: Handles physical network hardware and data link protocols (Ethernet, ARP).

  • Common Vulnerabilities:

    • MAC Spoofing: Changing the MAC address to impersonate another device.

    • ARP Spoofing/Poisoning: Sending fake ARP messages to associate attacker’s MAC with IP of a legitimate host, enabling man-in-the-middle attacks.

    • Switch Spoofing & VLAN Hopping: Manipulating VLAN tags to gain unauthorized access to network segments.


Summary Table

TCP/IP LayerCommon VulnerabilitiesAttack Examples
Application LayerInjection, Buffer Overflow, DNS SpoofingSQL Injection, Email Spoofing
Transport LayerSYN Flood, Session HijackingTCP SYN Flood
Internet LayerIP Spoofing, Smurf, FragmentationIP Spoofing, Smurf Attack
Network Interface LayerARP Spoofing, MAC Spoofing, VLAN HoppingARP Poisoning, MAC Spoofing