Save
INFASEC2
Save
Share
Learn
Content
Leaderboard
Learn
Created by
ObligingJellyfish72281
Visit profile
Cards (26)
ARP Poisoning
Manipulates network packets to intercept or modify data between devices
Attack Mechanism
Exploits website vulnerabilities to deliver malicious JavaScript to unsuspecting users
Attack Techniques
Various methods used to guess or decrypt passwords
Botnets
Networks of hacked machines controlled remotely by attackers, used to generate and launch DDoS attacks
Cross-Site Scripting
(XSS)
Executes malicious code in a user's browser through vulnerable websites
DDoS Attacks
Overloads online services with massive traffic, rendering them inaccessible
DNS Poisoning
Manipulates DNS servers to redirect users to fraudulent websites
Exploit Database
A repository of exploits related to vulnerabilities
Exploitation
Uses programmed software or scripts to exploit system vulnerabilities, gaining control
MITM
Intercepts and alters communication between parties without their knowledge
Password Hacking
Involves gaining unauthorized access to accounts or systems by guessing or decrypting passwords
Penetration Testing
Identifies and mitigates security vulnerabilities through simulated cyber attacks
Social Engineering
Manipulates individuals to compromise security
SQL Injection
Manipulates databases through input fields in web applications
Vulnerability Exploitation
Occurs when web applications fail to properly validate inputs before passing them to SQL statements
Vulnerability Scanners
Tools used to scan for vulnerabilities in systems
Wireless Hacking
Wireless networks connect devices via radio waves, offering flexibility but vulnerable to security threats
Wireless Network Components
Various components involved in wireless networks
Common Vulnerabilities and Exposures
(CVE)
Standard for information security vulnerability names, providing a dictionary of publicly known vulnerabilities and exposures
National Vulnerability Database
(NVD)
U.S. government repository of standards-based vulnerability management data, facilitating automation of vulnerability management and compliance
Remote Exploits
Used to gain access to remote systems or networks
Local Exploits
Used by system users to bypass their rights on local systems
Attributes of a
Strong Password
Contains at least 8 characters
Includes a mix of letters, numbers, and special characters
Utilizes a combination of lowercase and uppercase letters
Dictionary Attack
Uses a predefined list of words to guess passwords, exploiting weak or easily guessable passwords
Hybrid Dictionary Attack
Combines dictionary words with extensions (e.g., adding numbers) to generate potential passwords
Brute-Force Attack
Tries all possible combinations of characters to crack a password, requiring substantial processing power and time