Layer 1 – Physical
Traffic eavesdropping
Layer 2 – Data Link
MAC spoofing
ARP spoofing
VLAN hopping
DHCP spoofing
Rogue access points
Layer 3 – Network
IP spoofing
Manipulating routing tables
ICMP redirect
TCP/UDP flood (DDoS)
SYN flood (DDoS)
Smurf attack (DDoS)
Layer 4 – Transport
Lateral Movement
TCP/UDP port scanning
DNS poisoning
TCP/UDP flood (DDoS)
Layer 5 – Session
Access control bypass
Adversary-in-the-middle attack
Layer 6 – Presentation
Cracking encryption
Injection attacks
File inclusion vulnerabilities
Cross-site scripting (XSS)
Cross-site request forgery (CSRF)
Layer 7 – Application
Phishing
Password cracking
Buffer overflow
Format string attack