CISSP · · 4 min read

Network Attacks and Countermeasures: From Scanning to Man in the Middle

Scanning, spoofing, and hijacking are standard moves for attackers. Learn common network attack patterns and the layered countermeasures that limit them.

Hook / Why this matters

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

Attackers start by understanding your network better than you do. Scanning, spoofing, hijacking, and interception are all standard moves. You do not need to memorize every exploit, but you must understand common attack patterns and what defenses limit them.

Core concept explained simply

Network attacks aim to discover systems, disrupt services, steal data, or hijack communications. They often follow a pattern:

  1. Reconnaissance and scanning.
  2. Initial exploitation.
  3. Lateral movement and privilege escalation.
  4. Data access and exfiltration.

Knowing typical techniques helps you design layered countermeasures.

Reconnaissance and scanning

Attackers begin by mapping your environment:

Countermeasures include:

Spoofing and hijacking

Spoofing and hijacking attacks manipulate identity or state in network communications.

Examples include:

Defenses involve:

Man in the middle attacks

Man in the middle (MITM) attacks place the attacker between two communicating parties.

Common avenues include:

Countermeasures include:

Denial of service and distributed denial of service

Denial of service (DoS) and distributed denial of service (DDoS) attacks attempt to overwhelm systems or networks.

They can target:

Defenses include:

Evasion techniques

Attackers use evasion to bypass detection:

Modern IDS and IPS systems include reassembly and normalization features to counter these techniques, but tuning and updates remain important.

CISSP lens

For Domain 4, your goals include:

On the exam, avoid answers that rely on obscurity alone or that apply the wrong control to the wrong layer.

Real-world scenario

An internal attacker connected a laptop to a conference room network that shared a VLAN with many user devices.

Using ARP spoofing tools, the attacker:

Because internal traffic was largely unencrypted and there were no switch level protections, the attacker collected sensitive data for several hours.

After discovering the issue, the organization responded by:

These changes made similar attacks much more difficult and easier to detect.

Common mistakes and misconceptions

Typical missteps include:

A CISSP should see internal trust assumptions as red flags and push for layered defenses.

Actionable checklist

To strengthen your defenses against common network attacks:

Key takeaways

Optional exam-style reflection question

An attacker sends forged ARP replies on a local network so that traffic intended for the default gateway is sent to their machine instead. What type of attack is this, and what is a key countermeasure?

Answer: This is an ARP spoofing or ARP poisoning attack that enables man in the middle interception on a local network. Dynamic ARP inspection on switches, combined with DHCP snooping and static ARP entries for critical devices where appropriate, can help prevent this by validating ARP messages before accepting them.

Read next

© 2025 Threat On The Wire. All rights reserved.