OSI-Modell Schicht 1 Schicht 2 Secure Neighbor Descovery Schicht 3 Finding victims: Scanning Schicht 4 Syn-Flood-Angriff Schicht 7 DNS-Spoofing Email-Spoofing Web-Spoofing, Phishing Angriffe auf Programme: Buffer Overflows etc.