Packet/Protocol abuse

Anything that’s a misuse or uses a networking protocol in ways it wasn’t intended to be used can be considered a threat.

Common examples #

NTP attack #

An attacker can spoof a source IP and submit a type of ntpdc query called monlist. This generates a lot of output and can effectively DoS the target server (spoofed source IP).

DHCP attack #

Hacker can send malformed packets to try to break, gain access, or shut down the DHCP server.

cite: CompTIA Network+