Skip to content

Tag Archives: Ethical Hacking – Network Attacks

Ethical Hacking – Network Attacks

In a DHCP starvation attack, an attacker creates spoofed DHCP requests with the goal of consuming all available IP addresses that a DHCP server can… Read More
Rainbow Tables are a large set of pre-computed hashes that are used for reversing cryptographic hash functions generally used for password cracking. It makes password… Read More
Client-Side HTTP Parameter Pollution is a client-side security vulnerability in web applications designed to use HTTP requests. HTTP parameter pollution exploits the ability of HTTP… Read More
A salami attack is a method of cybercrime that attackers or a hacker typically used to commit financial crimes. Cybercriminals steal money or resources from… Read More
Injection attacks are the most well-known attacks used by hackers to inject code or malware into programs or to query a computer to run remote… Read More
Virus hoaxes are warning messages of viruses that are distributed via pop-ups, emails, and spam messages, the main objective of the virus hoax is to… Read More
A heuristic virus is a type of computer virus that replicates by guessing. It does this by analyzing what it perceives as the user’s behavior… Read More
Rogue DHCP server attacks are gaining popularity but can be mitigated. The hacker sets up a rogue DHCP server and creates an IP address conflict… Read More
This attack can be used to manipulate the web application’s access to a database using database connectivity objects. It is also the often overlooked method… Read More
MAC Spoofing is a type of attack used to exploit flaws in the authentication mechanism implemented by wired and wireless networking hardware. In layman’s terms,… Read More
Active Sniffing Attacks in Ethical Hacking can lead to using the intercepted data for malicious purposes. The most common use of sniffing is to steal… Read More
Honeypots are computer applications that collect information from hackers and other criminals. They can be used from a physical or a virtual location, and come… Read More
The term “attack” is used here to denote performing a variety of hacks, including brute force and social engineering, that require access to the target’s… Read More
Non-electronic password attacks are forms of hacking that seek to bypass any form of authentication or authentication system. Typically, a non-electronic password attack will use… Read More
Heartbleed bugs are categorized as Common Vulnerabilities and Exposures, the standard information security vulnerability name managed by MITER as CVE-2014-0160. This is a buffer over-read-if… Read More