• Confidentiality Violations
  • Password Sniffing
  • Offline Cryptographic Attacks
  • Replay Attacks
  • Message Insertion
  • Message Deletion
  • Message Modification
  • Man-In-The-Middle
  • Denial of Service
  • Code Injection
  • On-path Attacks
  • Off-path Attacks
  • Link-local Attacks