Network-based vulnerabilities and exploits can be catastrophic because of the types of damage and impact they can cause in an organization. The following are some examples of network-based attacks and exploits:
- Windows name resolution-based attacks and exploits
- Attacks and exploits against Server Message Block implementations
- DNS cache poisoning attacks
- Simple Network Management Protocol vulnerabilities and exploits
- Simple Mail Transfer Protocol SMTP vulnerabilities and exploits
- File Transfer Protocol FTP - vulnerabilities and exploits
- Pass-the-Hash Attacks
- Kerberos and LDAP-Based Attacks
- On-path attacks (previously known as man-in-the-middle MITM or On-Path Attacks )
- SSL stripping attacks
- Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks - DoS and DDoS Attacks
- NAC bypass
- Virtual local area network - VLAN Hopping attacks
- DHCP Attacks