Advanced Search
Search Results
614 total results found
On Path Attack
A type of web server attack where the attacker intercepts comms between two devices and modifies them. The most common example of an on-path attack is where the attacker intercepts login credentials and then uses them to gain unauthorized access to user accou...
Brute Force Attack
A password attack method where the attacker attempts to guess the password through trial and error with every combination of every imputable character. There are several types of brute force attacks. Attack Methods Method Description Online The attacker...
Insider Attack
A type of network attack where an active or former employee of an organization still has access to the internal network and seeks to steal data and/or to wreak havoc.
MAC Spoofing
A type of network attack where the attacker scans the network for valid MAC addresses, matches the IP address to his own, then rewrites the network switch's CAM so that all data sent to the target is now sent to the attacker.
Zero Day Attack
A type of network attack where the attacker exploits a vulnerability previously unknown to the network administrator or software developer - hence the name "zero day," as in the number of days the responsible person has known about the vulnerability.
Principle of Least Privilege
This principle states that users should only have enough permissions to do their job effectively, and nothing more.
Master File Table
A database that stores information about all files and directories in the NTFS file system. It also helps the OS manage system files and allocate space. Features file size creation date/time last modification date/time author file type / file extension permis...
Virus
A self-replicating type of malware that often mimic or attach to legitimate programs and hide inside them. It modifies, backdoors, and/or damages the infected system. There are different types of viruses. Boot Sector Virus This type executes every time the sys...
Trojan Horse
A type of malware that provides an attacker remote access to an infected system. This program is often hidden inside a legitimate program, and once ran, the hacker could install other malware.
Keylogger
A type of malware that logs every keystroke a user makes and sends it back to the attacker. This can be used in a number of fashions, like to get passwords, for example.
Spyware
A type of malware that's designed to collect information about the victim who's system got infected with it. Spyware is usually able to track anything the user does on their system from the moment of infection onward.
Ransomware
A malware program that forces the victim to either send a form of payment in order to decrypt their encrypted files, which there's no guarantee that the attacker will send the decryption key once the payment's done.
Cryptominer
A malware program that uses the resources of a system to mine cryptocurrency for the attacker.
Rootkit
A malware program designed to give the attacker remote access and administrator privileges on Linux-based machines. #XIV
Clamav
An external, supplementary antivirus software program for Linux systems. Not generally needed since Linux systems by themselves are hard to infect with malware. Installation & Usage sudo apt install clamav (CLI-only) sudo freshclam (Updates virus definitions) ...
Certificate of Destruction
aliases: COD A document that states a storage disk was properly destroyed by an outsourced, licensed organization. This should be kept in internal records of the organization that owned the storage disk. Information serial number destruction method signat...
Dumpster Diving
In this case, dumpster diving is when an attacker attempts to find sensitive data by going through the trash. <p style="color:#1e1e3f ">because they're poor lmao #XIV
Windows Task Manager
A system utility on Windows-based systems that allows the user to monitor running programs and view information about them. Access Ctrl+Alt+Delete then select Task Manager Ctrl+Shift+Esc Right-click an empty area of the task bar and select Task Manager Window...