Cyb201 Note1
Cyb201 Note1
2. DNS Spoofing
DNS Spoofing is a type of computer security hacking. Whereby a data is
introduced into a DNS resolver's cache causing the name server to
return an incorrect IP address, diverting traffic to the attackers
computer or any other computer. The DNS spoofing attacks can go on
for a long period of time without being detected and can cause serious
security issues.
3. Session Hijacking
It is a security attack on a user session over a protected
network. Web applications create cookies to store the state
and user sessions. By stealing the cookies, an attacker can
have access to all of the user data.
4. Phishing
Phishing is a type of attack which attempts to steal sensitive
information like user login credentials and credit card number.
It occurs when an attacker is masquerading as a trustworthy
entity in electronic communication.
5. Brute force
It is a type of attack which uses a trial and error method. This attack
generates a large number of guesses and validates them to obtain
actual data like user password and personal identification number.
This attack may be used by criminals to crack encrypted data, or by
security, analysts to test an organization's network security.
6. Denial of Service
It is an attack which meant to make a server or network resource
unavailable to the users. It accomplishes this by flooding the target
with traffic or sending it information that triggers a crash. It uses
the single system and single internet connection to attack a server.
Denial of Service It can be classified into the following:-
8. URL Interpretation
It is a type of attack where we can change the certain parts
of a URL, and one can make a web server to deliver web
pages for which he is not authorized to browse.
9. File Inclusion attacks
It is a type of attack that allows an attacker to access
unauthorized or essential files which is available on the
web server or to execute malicious files on the web
server by making use of the include functionality.