PracticeBlogFlashcardsEspañol

Network Attacks and Scenario Cues

Key Takeaways

  • DoS and DDoS target availability by exhausting bandwidth, sessions, application resources, or infrastructure capacity.
  • Layer 2 attacks include VLAN hopping, MAC flooding, ARP poisoning, rogue DHCP, and some on-path techniques.
  • DNS poisoning and rogue DNS attacks can redirect users even when their devices appear connected normally.
  • Evil twin access points and social engineering often target users instead of infrastructure weaknesses alone.
  • Attack identification depends on symptoms, affected layer, logs, and packet behavior.
Last updated: April 2026

Network Attacks and Cues

Network attacks often reveal themselves through symptoms before the exact cause is known. Network+ scenarios may describe user complaints, switch table behavior, DHCP leases, DNS answers, wireless SSIDs, or packet captures. The fastest way to classify the attack is to ask what changed and which layer is involved.

Availability Attacks

AttackWhat happensCommon cue
DoSOne source disrupts serviceSingle host floods a web server
DDoSMany sources disrupt serviceTraffic arrives from many networks or botnet nodes
Resource exhaustionCPU, memory, session table, or application pool fillsFirewall sessions max out or application stops responding
AmplificationSmall requests trigger large responses toward victimLarge DNS, NTP, or UDP responses overwhelm target

DDoS mitigation can include upstream filtering, scrubbing centers, CDN or WAF services, rate limiting, anycast, capacity planning, and runbooks with providers. A local firewall rule may not help if the Internet circuit is already saturated upstream.

Layer 2 and Local Network Attacks

AttackMechanismSymptom
VLAN hoppingAttacker reaches traffic in another VLAN through trunk misuse or double taggingHost accesses VLAN it should not reach
MAC floodingSwitch CAM table is filled with bogus MAC addressesSwitch may flood frames like a hub
ARP poisoningAttacker sends false IP-to-MAC mappingsTraffic passes through attacker or reaches wrong host
Rogue DHCPUnauthorized DHCP server gives bad leasesClients get wrong gateway, DNS, or subnet
On-path attackAttacker intercepts or relays traffic between partiesSessions are observed or modified in transit

Layer 2 protections include disabling unused ports, access mode on user ports, limiting allowed VLANs on trunks, native VLAN hardening, port security, DHCP snooping, dynamic ARP inspection, IP source guard, and 802.1X.

DNS and Wireless Attacks

AttackWhat changesImpact
DNS poisoningDNS cache or answer is falsifiedUsers reach attacker-controlled addresses
Rogue DNSClient is told to use an unauthorized DNS serverName resolution can be monitored or redirected
Evil twinFake AP impersonates a legitimate SSIDUsers connect to attacker wireless
Deauthentication abuseClients are forced off a wireless networkUsers reconnect to attacker AP or lose service

Encrypted web connections can reduce some damage from DNS redirection because certificate validation may warn users when the hostname does not match the destination. That does not make DNS attacks harmless. Attackers can still redirect to lookalike domains, capture clear-text traffic, or disrupt access.

Social Engineering

Social engineering manipulates people into taking unsafe actions. In network scenarios, attackers may call the help desk for a password reset, send a phishing message with a fake VPN portal, leave a malicious QR code near a conference room, or impersonate a technician to gain wiring closet access.

Social techniqueNetwork security angle
PhishingHarvest VPN, SSO, or email credentials
VishingVoice call persuades help desk or user
SmishingText message links to fake login or MFA prompt
TailgatingUnauthorized person enters a network or server room area
ImpersonationAttacker pretends to be vendor, employee, or support

Common Traps

  • ARP poisoning affects local IP-to-MAC mapping; DNS poisoning affects name-to-IP resolution.
  • MAC flooding targets switch forwarding tables, not IP routing tables.
  • Rogue DHCP can cause DNS and gateway symptoms even if the real DHCP server is healthy.
  • Evil twin attacks can use a familiar SSID name; the name alone does not prove legitimacy.
  • DDoS response may require ISP or cloud provider coordination, especially when bandwidth is saturated.
Test Your Knowledge

Clients suddenly receive DHCP leases with an unknown default gateway and DNS server. What attack or issue is most likely?

A
B
C
D
Test Your Knowledge

A switch begins flooding traffic after its MAC address table fills with thousands of bogus entries. Which attack does this describe?

A
B
C
D
Test Your KnowledgeMatching

Match each attack to its primary cue.

Match each item on the left with the correct item on the right

1
ARP poisoning
2
DNS poisoning
3
Evil twin
4
DDoS