I am looking for raw data captures of different forms of att
I am looking for raw data captures of different forms of attacks. I want, for example, for someone to know what a buffer overflow attack looks like if they see it in traffic. Or a directory traversal attack. Or a SQL attack.
Now, I will only count the first unique one. I do not want to be inundated with the same attack. moreover, I expect you to provide an explanation as to what to look for.
I will add points to where you need it most. How many depends upon the level of effort and how informational your effort is.....
Post them in here. I will only allow two per person at this time.
Solution
Buffer overflow attack happens when we try to allocate and use the addresses inside a buffer (typically a stack) and try to overflow the input which exceeds the size of the buffer.
This causes issues in the code and the user can get access to system with fake passwords.
Example of such case is password field.
Let us suppose a user creates a password of size 10.
char pass[10]
Now if a hacker enters a password in prompt say aaabbbccccccc
this will cause buffer overflow and the checks will fail.
Even though the password is wrong the attacker will be able to login the system.
Directory traversal attacks are generally done on a website where the attackers tries to get access to other files and folders on the web server. Usually in any web applications the user accessible files are kept in folder www and other files are kept in other directories. If there is an issue with permission of any file/folder in the same hierarchy the attacker might try to find the same file.
Directory traversal attacks can be easily done from a web browser if the attacker is able to find the path of the file/folder effected by this.
Attackers can simply give the path of the file in url
example staging.test.com/pass.txt and can get access to some important files.
SQL attack or SQL injection is some of the sophiscated items inserted directly into the forms/field which can grant access to the users. Usually attackers provides some special charactes which can cause sql query to return true for the case. since the checking is depdedent on the sql query result it returns true and therefore attacker gets access to the account.

