Exploring potential network attacks across the seven layers of the OSI model. A unique icon represents each layer: π Application Layer: π€ Pushing π¦ Malware injection π DDoS attacks π¨ Presentation Layer: π Encoding/decoding vulnerabilities π Format string attacks π¨ Malicious code injection π Session Layer: πͺ Session hijacking π Session fixation attacks π¨ Brute force attacks π Transport Layer: π SYN/ACK flood π Network Layer: π IP spoofing π Route table manipulation π DDoS attacks π Data Link Layer: π§ MAC address spoofing π ARP spoofing π VLAN hopping β‘ Physical Layer: π‘ Wiretapping π¨ Physical tampering β‘ Electromagnetic interference