Technical Attacks
When attackers target the technology directly. Brute force, denial of service, SQL injection, and data interception - the attacks that exploit weaknesses in software, protocols, and network infrastructure.
At exactly 11:00pm on launch night, the gaming company's servers go quiet. Hundreds of thousands of players trying to log in get the same error: connection refused. The company's engineers can see millions of requests flooding in simultaneously - far more than any legitimate player base could generate. By the time they respond, the launch window is gone.
Unlike social engineering, technical attacks exploit weaknesses in software, protocols and network infrastructure directly. They require more technical knowledge but can be devastatingly effective at scale.
Technical attack questions often ask you to explain how an attack works, not just name it. For SQL injection especially, examiners want to see that you understand the mechanism. DoS vs DDoS is a distinction that frequently comes up - know the difference precisely.
Brute force and dictionary attacks
A brute force attack uses automated software to try every possible combination of characters until the correct password is found. Given enough time and computing power, every password is eventually crackable by brute force - the question is how long it takes.
A 4-digit PIN has only 10,000 combinations - cracked in under a second. A 12-character password using uppercase, lowercase, numbers and symbols has over 475 quintillion possibilities - potentially thousands of years at current speeds.
DoS, DDoS and SQL Injection
A DoS attack floods a server or network with so much traffic that it cannot respond to legitimate requests. The server's resources (bandwidth, memory, processing power) are exhausted, causing a service outage for real users.
A DDoS (Distributed Denial of Service) attack is the same principle but launched simultaneously from thousands of compromised devices (forming a botnet). This makes it far harder to block - you can't simply ban a single IP address when the traffic comes from 100,000 different sources worldwide.
SQL injection exploits poorly sanitised input fields on websites that interact with a database. An attacker enters malicious SQL code into a text field (such as a login box or search bar), which gets passed directly to the database query - making it execute unintended commands.
This can allow attackers to bypass authentication, extract entire database contents, modify or delete records, or even gain administrative control.
Packet sniffing & man-in-the-middle - interactive explorer
Packet sniffing involves intercepting data packets as they travel across a network. On unencrypted networks, the content of packets - including passwords and personal data - can be read directly by an attacker with the right software.
A man-in-the-middle (MITM) attack goes further: the attacker secretly intercepts and potentially modifies communications between two parties who believe they are communicating directly. The attacker sits "in the middle", reading and possibly altering everything that passes through.
' OR 1=1; -- into a website's username field and gains access without a valid password. What attack is this?A DDoS attack is described as "sending lots of traffic to a server." Explain in detail how this causes disruption, and why simply blocking individual attacking IP addresses is ineffective against a DDoS attack.
Why blocking IPs is ineffective: A DDoS attack originates from thousands or millions of different devices (a botnet) spread across different countries and ISPs. Each device sends traffic from a different IP address. To block the attack by IP, the target would need to block thousands of different addresses simultaneously - while new ones keep appearing. Additionally, many of the attacking IP addresses belong to innocent devices that have been compromised without their owners' knowledge, so simply blocking them would also block legitimate future traffic from those addresses.
Practice what you have learned
Three levels of worksheet for this lesson. Download, print and complete offline.