
What is a Dictionary attack ?
What is a Dictionary attack?
A dictionary attack is a more sophisticated form of the brute force password attack,
A dictionary attack is a more sophisticated form of brute force password attack,
where thousands, if not millions, of randomly generated passwords are attempted in order to break password security.
where thousands, if not millions, of randomly generated passwords are tried to break password security.
In the dictionary attack, the attacker starts with lists of possible passwords,
In a dictionary attack, the attacker starts with a list of possible passwords,
removing some of the random element of the brute force attack.
remove some random elements from a brute force attack.
_________________________
what is Back door ?
what is black door ?
A back door is generally a piece of code intentionally left by the developer of the software or firmware that allows access without going through the normal security process.
A black door is usually a piece of code that is intentionally left behind by a software developer or Firmware that allows access without going through the normal security process.
Back doors may also be the result of different malware/virus attacks that leave a method for remote,
Black door may also be the result of various malware/virus attacks that leave the method to remote, or,
unsecured access into a device once the malicious code has been executed.
unsafe access to the device after malicious code is executed.
_________________________
What is Man in the middle attack ?
Is that Man in the middle of an attack?
The man in the middle attack requires that the connection between two computers be compromised.
The man in the middle of the attack required that the connection between the two computers be compromised.
This man in the middle captures and relays the information being passed between the originator and the target in order to glean information from the data.
The man in the middle of this captures and conveys the information conveyed between the originator and the target to get the information from the data.
Using a secure authentication method between computers, which repeatedly checks for authentication signatures of some type, will reduce people in a middle attack.
_________________________
What is Spear phishing ?
What is a phishing attack?
TSpear phishing attacks are more narrowly targeted than regular phishing attacks.
TSpear phishing attacks are narrower than regular phishing attacks.
These attacks pretend to be messages from trusted and recognized sources, such as bank communications or your internal network resource, to get the user to respond to a message or link.
These attacks pretend to be messages from a trusted and identifiable source, such as a bank communication or your internal network resources, to get users to respond to messages or links.
This takes them outside of their protected network, making their computer suspectable to attack.
This takes them out of a protected network, leaving their computers vulnerable to attack.
_________________________
What are Social engineering attacks ?
What is a social engineering attack?
Social engineering attacks are aimed at the weakest part of any IT security system: the end user. These are attacks that attempt to trick the user into responding. The attack may ply on the user’s sympathy, or link to something of interest (such as the famous Anna Kournikova attack in 2001).These attacks can be as straightforward as a simple phishing email, or more complex, involving computer-based efforts as well as interactions in the real world.
Social engineering attacks are aimed at the weakest part of any IT security system: the end user. This is an attack that tries to trick the user into responding. The attack may rest on user sympathy, or a link to something of interest (such as the infamous Anna Kournikova attack in 2001). These attacks can be as easy as simple phishing emails, or more complex, involving computer-based efforts as well as real-world interactions.
_________________________
What is Visual Hacking ?
What is Visual Hacking?
Visual hacking is an in-person form of hacking that takes advantage of poor security on the part of end users.When it comes to securing a work computer and physical workspace, few employees take good care not to leave information up on their screens or around their desks. Taking a walk through a large company will certainly prove unattended computers still logged into networks, passwords taped to monitors, and sensitive corporate data left in plain sight on desk. A recent test by the Ponemon Institute on 43 volunteer offices found that they were successful almost nine times out of ten in gaining access to sensitive corporate data simply by walking through office spaces.
Visual hacking is a form of personal hacking that takes advantage of the poor security of the end user. When it comes to securing a work computer and physical workspace, some employees are careful not to leave information on their screens or around their desks.Walking through large companies will often reveal unattended computers still logging into the network, passwords were affixed to monitors, and sensitive corporate data was simply left on the desk. A recent test by the Ponemon Institute on 43 volunteer offices found that they were successful nearly nine times out of ten in gaining access to sensitive corporate data on foot
_________________________
14 May 2020
Rest assured to yourself that you can achieve it and keep learning until you can !!!
never once2 give up in the middle of the road !!
~salam author*