Layer 1 – Physical
Traffic eavesdropping

Layer 2 – Data Link
MAC spoofing
ARP spoofing
VLAN hopping
DHCP spoofing
Rogue access points

Layer 3 – Network
IP spoofing
Manipulating routing tables
ICMP redirect
TCP/UDP flood (DDoS)
SYN flood (DDoS)
Smurf attack (DDoS)

Layer 4 – Transport
Lateral Movement
TCP/UDP port scanning
DNS poisoning
TCP/UDP flood (DDoS)

Layer 5 – Session
Access control bypass
Adversary-in-the-middle attack

Layer 6 – Presentation
Cracking encryption
Injection attacks
File inclusion vulnerabilities
Cross-site scripting (XSS)
Cross-site request forgery (CSRF)

Layer 7 – Application
Phishing
Password cracking
Buffer overflow
Format string attack