To access material, start machines and answer questions login.
The Protocols and Servers room covered many protocols:
- Telnet
Servers implementing these protocols are subject to different kinds of attacks. To name a few, consider:
- Sniffing Attack (Network Packet Capture)
- Man-in-the-Middle () Attack
- Password Attack (Authentication Attack)
- Vulnerabilities
From a security perspective, we always need to think about what we aim to protect; consider the security triad: Confidentiality, , and Availability (). Confidentiality refers to keeping the contents of the communications accessible to the intended parties. is the idea of assuring any data sent is accurate, consistent, and complete when reaching its destination. Finally, availability refers to being able to access the service when we need it. Different parties will put varying emphasis on these three. For instance, confidentiality would be the highest priority for an intelligence agency. Online banking will put most emphasis on the of transactions. Availability is of the highest importance for any platform making money by serving ads.
Knowing that we are protecting the Confidentiality, , and Availability (), an attack aims to cause Disclosure, Alteration, and Destruction (). The figures below reflect this.

These attacks directly affect the security of the system. For instance, network packet capture violates confidentiality and leads to the disclosure of information. A successful password attack can also lead to disclosure. On the other hand, a Man-in-the-Middle () attack breaks the system’s as it can alter the communicated data. We will focus on these three attacks in this room as these attacks are integral to the protocol design and server implementation.
Vulnerabilities are of a broader spectrum, and exploited vulnerabilities have different impacts on the target systems. For instance, exploiting a Denial of Service () vulnerability can affect the system’s availability, while exploiting a Remote Code Execution () vulnerability can lead to more severe damages. It is important to note that a vulnerability by itself creates a risk; damage can occur only when the vulnerability is exploited. We don’t cover vulnerabilities in this room as they have their own module, Vulnerability Research.
This room will focus on how a protocol can be upgraded or replaced to protect against disclosure and alteration, i.e. protecting the confidentiality and of the transmitted data. We will be recommending other modules that cover additional topics.
Moreover, we introduce to find weak passwords.
Ready to learn Cyber Security?
The Protocols and Servers 2 room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
