Rootways of the World Tree (@Internet)¶
Ghosts don’t fear heights—they own the view.
- Transmission Control Protocol (TCP)
- Internet Protocol (IPv4 and IPv6)
- Internet Protocol version 4 (IPv4) protocol notes
- Internet Protocol version 6 (IPv6) protocol notes
- Attack tree (IPv4 and IPv6)
- IP fragmentation (IPv4)
- ICMP abuse (IPv4)
- ARP apoofing/poisoning (IPv4)
- NAT abuse (IPv4)
- SLAAC & RA attacks (IPv6)
- NDP exploitation (IPv6)
- IPv6 Extension header abuse
- Dual-stack attacks (IPv4 and IPv6)
- IP spoofing & DDoS amplification
- BGP hijacking & route leaks
- TTL expiry attacks
- Geolocation spoofing
- Border Gateway Protocol (BGP and MP-BGP)
- Border Gateway Protocol (BGP) notes
- Multiprotocol BGP (MP-BGP) notes
- Attack tree (BGP and MP-BGP)
- IPv4 prefix hijacking
- IPv4 path manipulation
- IPv4 infrastructure attacks
- Multiprotocol label switching (MPLS) attacks (MP-BGP)
- Address family exploitation (MP-BGP)
- MP-BGP session attacks
- RPKI infrastructure attacks
- DDoS amplification attacks
- Cryptographic attacks on routing protocols
- BGP and DNS infrastructure attacks
- BGP + CDN/Cloud infrastructure attacks
- AI-powered BGP attacks
- Internet Control Message Protocol (ICMP)
- Overview attacks on ICMP
- ICMP Echo sweeping (Ping sweep)
- TTL manipulation for OS fingerprinting
- ICMP-based service discovery
- ICMP tunnelling for data exfiltration & covert channels
- Fragmented ICMP exfiltration techniques
- DNS-over-ICMP (C2) covert channels
- ICMP flood attacks
- ICMP amplification attacks
- Ping of Death (Modern variants)
- NAT/Firewall bypass techniques
- Lateral movement via ICMP
- ICMPv6 router advertisement spoofing
- ICMP side-channel attacks
- IoT/OT device crashes via ICMP
- Cloud metadata service abuse via ICMP
- Adaptive evasion techniques
- Autonomous attack systems
- Forensic evasion techniques
- Security control bypass techniques
- Domain Name System (DNS)
- Internet Protocol Security (IPsec)
- Internet Protocol Security (IPsec) protocol notes
- Attack tree (IPsec)
- IPsec cryptographic attacks
- IPsec key management attacks
- IPsec implementation flaw attacks
- IPsec protocol downgrade attacks
- IPsec Security Association Manipulation Attacks
- IPsec identity spoofing attacks
- IPsec memory corruption attacks
- IPsec resource exhaustion attacks
- IPsec configuration bypass attacks
- Border Gateway Protocol Security (BGPsec)