Dictionary attack - A method of breaking a password by using a library of commonly used words or phrases to guess possible passwords, Brute Force attack - A password attack in which the attacker uses all possible combinations of characters until a password match is fouIt can take thousands of guesses before a password is cracked., SQL Injection - Where malicious code is injected into input fields of a web application’s database query., Buffer Overflow - Occurs when a program writes more data to a block of memory than it was allocated to hold, which can lead to the overwriting of adjacent memory areas, unpreditacble behavior, system crashes, or allowing attackers to execute malicious code., Spoofing - The deceptive practice of assuming a false identity or falsifying information to gain unauthorized access or deceive users and systems., MiTM - Involves an unauthorized third party intercepting and potentially altering communication between two parties without their knowledge., ARP Poisoning - Involves manipulating or corrupting the ARP cache on a local network. The attacker sends falsified messages, assocating their MAC address with the IP address of a legitimate network device., DoS attack - A malicious attempt to disrupt the normal functioning of a targeted system, service, or network by overwhelming it with a flood of illegitimate requests or traffic., Ping of Death - Exploits vulnerabilities in the Internet Control Message Protocol (ICMP) by sending malformed or oversized packets to a target system., Ping Flood - Where an attacker sends a mass volume of ICMP echo requests to a target system, overwhelming it with traffic. The goal is to consume the target’s resources, such as network bandwidth or processing capacity., Smurf - The attacker sends a large volume of ICMP echo request packets to a network’s broadcast address using a spoofed source address, making it appear as if the requests are originating from the victim’s address., SSL attack - These protocols utilize cryptography to ensure the confidentiality and integrity of data being exchanged between clients and servers.. An attacker targets the specific protocols in several ways to disrupt the confidentiality and integrity and manipulate the data in question., Social Engineering - The manipulation of individuals to gain unauthorized access to sensitive information or systems. It involves exploiting human psychology rather than relying on technical vulnerabilities., Impersonation - Pretending to be someone else to gain trust and extract information., Phising attack - Sending deceptive emails, messages, or websites that appear to be from a trustworthy source to trick individuals into revealing sensitive information.,
0%
Common Attacks and Threats
Bendrinti
prie
Echo15
Higher Education
Cybersecurity
Redaguoti turinį
Įterpti
Daugiau
Lyderių lentelė
Rodyti daugiau
Rodyti mažiau
Ši lyderių lentelė šiuo metu yra privati. Spustelėkite
Bendrinti
, kad ji būtų vieša.
Ši lyderių lentelė buvo išjungta išteklių savininko.
Ši lyderių lentelė yra išjungta, nes jūsų parinktys skiriasi nuo nustatytų išteklių savininko.
Grąžinti parinktis
Rask tinkamą
yra neterminuotas šablonas. Jis negeneruoja rezultatų lyedrių lentelei.
Reikia prisijungti
Vizualinis stilius
Šriftai
Būtina prenumerata
Parinktys
Pakeisti šabloną
Rodyti viską
Pradėjus veiklą bus rodoma daugiau formatų.
Atviri rezultatai
Kopijuoti nuorodą
QR kodas
Naikinti
Atkurti automatiškai įrašytą:
?