๐ŸŒ NETWORK SECURITY โ€” OSI Layer 1โ€“8

OSI Model (Layer 1โ€“7) + Layer 8 tidak resmi yang justru paling sering jebol. Setiap layer punya threat, defender, dan attacker masing-masing. Satu serangan bisa menembus satu layer dan cascade ke layer lain.

Cara Baca

Layer 1 = paling fisik (kabel). Layer 7 = paling abstrak (aplikasi). Layer 8 = manusia. Kolom Blue Team = pertahanan. Kolom Red Team = serangan. Baca dari bawah ke atas untuk memahami attack surface secara sistematis.


Tabel Threat per OSI Layer

OSI LayerNama Layerโ˜ฃ๏ธ Threat yang Bersarang๐Ÿ”ต Blue Team (Defender)๐Ÿ”ด Red Team (Attacker)
Layer 1PhysicalTap kabel fisik, hardware keylogger, evil maid attack, rogue device ditempel ke switchPhysical security, tamper-evident seal, port lock USB, CCTV rack serverLAN Tap (Throwing Star), USB Rubber Ducky, O.MG Cable
Layer 2Data LinkARP Poisoning, MAC Spoofing, VLAN Hopping, rogue switch802.1X NAC, Dynamic ARP Inspection (DAI), port security, private VLANEttercap, Bettercap, Yersinia (VLAN attack)
Layer 3NetworkIP Spoofing, BGP Hijack, ICMP Tunnel (data exfil lewat ping), route poisoningFirewall stateful, BCP38 ingress filtering, BGP route filtering (RPKI)Scapy, BGP hijack nation-state (China Telecom incidents), iodine (DNS tunnel)
Layer 4TransportTCP SYN Flood, port scanning, session hijacking, UDP amplification DDoSIPS/IDS (Suricata, Snort), rate limiting, SYN Cookie, Anycast DDoS mitigationNmap, Masscan, hping3, Mirai botnet
Layer 5โ€“6Session / PresentationSSL Stripping, TLS Downgrade Attack, rogue certificate, cert pinning bypassHSTS Preload, certificate pinning, TLS 1.3 enforcement, CT log monitoringSSLstrip2, MITM frameworks, Burp Suite (cert spoof)
Layer 7ApplicationSQLi, XSS, RCE, API abuse, SSRF, deserialisasi berbahaya, Log4ShellWAF (ModSecurity, Cloudflare), SAST/DAST, bug bounty, patch managementBurp Suite Pro, SQLmap, Nuclei, ffuf, exploit-db
โ˜ ๏ธ Layer 8Human (tidak resmi)Phishing, Spear Phishing, Vishing, Pretexting, BEC (Business Email Compromise)Security awareness training, MFA wajib, anti-phishing gateway (Proofpoint), simulasi phishing internalGoPhish, Social Engineering Toolkit (SET), OSINT (Maltego, SpiderFoot)

Layer 8 adalah Layer Paling Berbahaya

Tidak ada firewall yang bisa memblokir manusia yang sudah ditipu. Social engineering melewati semua kontrol teknis di Layer 1โ€“7 sekaligus.


Peta Posisi Threat โ€” Network

Layer 1  โ”‚ Physical          โ†’ Tap kabel, rogue device
Layer 2  โ”‚ Data Link         โ†’ ARP Poison, VLAN Hop
Layer 3  โ”‚ Network           โ†’ IP Spoof, BGP Hijack
Layer 4  โ”‚ Transport         โ†’ SYN Flood, DDoS
Layer 5-6โ”‚ Session/Present.  โ†’ SSL Strip, TLS Downgrade
Layer 7  โ”‚ Application       โ†’ SQLi, XSS, RCE, Log4Shell
Layer 8  โ”‚ โ† MANUSIA DI SINI โ†’ Phishing bypass semua layer di atas

๐Ÿ”— Lihat Juga


Network Security | OSI Layer 1โ€“8 ยท Blue Team vs Red Team per Layer