Data Breach A data breach, also known as a data spill or data leak, is an incident that involves the unauthorized or illegal viewing, access, or retrieval of data by an individual, application or service. Database Fingerprinting & Reconnaissance Database fingerprinting is the process of 'feeling out' a database using SQL to gather more information to be able to perform a more successful attack. Database Interrogation The process of using basic SQL injections and guesswork to find out information about a database (see Database Fingerprinting). Device Fingerprinting Device fingerprinting is a way to combine certain attributes of a device such as OS, browser version, browser language version, IP address to identify it as a unique device. Distributed Denial of Service (DDoS) A distributed denial-of-service (DDoS) attack is a malicious method of disrupting the normal traffic of a targeted website, service, server or network. DNS Spoofing DNS spoofing, also referred to as DNS cache poisoning, is a form of hacking in which corrupt Domain Name System data is introduced into the DNS resolver's cache, causing the name server to return an incorrect response, e.g. an IP address. Emergency Response Team (ERT) / Computer Emergency Response Team (CERT) An Emergency Response Team (ERT), also known as an Computer Emergency Response Team (CERT), is a group of information security experts responsible for the protection against, detection of and response to an organization’s cybersecurity incidents. Executable File Upload An executable file (exe file) contains an encoded sequence of instructions that the system can execute directly when the user clicks the file icon. Previous 1 2 3 4 5 6 ... Next 4 5 6
Data Breach A data breach, also known as a data spill or data leak, is an incident that involves the unauthorized or illegal viewing, access, or retrieval of data by an individual, application or service.
Database Fingerprinting & Reconnaissance Database fingerprinting is the process of 'feeling out' a database using SQL to gather more information to be able to perform a more successful attack.
Database Interrogation The process of using basic SQL injections and guesswork to find out information about a database (see Database Fingerprinting).
Device Fingerprinting Device fingerprinting is a way to combine certain attributes of a device such as OS, browser version, browser language version, IP address to identify it as a unique device.
Distributed Denial of Service (DDoS) A distributed denial-of-service (DDoS) attack is a malicious method of disrupting the normal traffic of a targeted website, service, server or network.
DNS Spoofing DNS spoofing, also referred to as DNS cache poisoning, is a form of hacking in which corrupt Domain Name System data is introduced into the DNS resolver's cache, causing the name server to return an incorrect response, e.g. an IP address.
Emergency Response Team (ERT) / Computer Emergency Response Team (CERT) An Emergency Response Team (ERT), also known as an Computer Emergency Response Team (CERT), is a group of information security experts responsible for the protection against, detection of and response to an organization’s cybersecurity incidents.
Executable File Upload An executable file (exe file) contains an encoded sequence of instructions that the system can execute directly when the user clicks the file icon.