Please enable JavaScript.
Coggle requires JavaScript to display documents.
Phishing (Password attacks (Brute Force (Guessing, Based on a Image of the…
Phishing
Password attacks
Hybrid Attacks
2 or more types of attacks
Dictionary Attack
Info about the target is taken into account
Birthday Attack
Mathematical algorithms
Brute Force
Guessing
Based on a Image of the encryption
Rainbow Tables
Matching Cyfer text to the generated one
Vishing
Spear phishing
Single target or a group who have something in common
Strategically Attack fashioned to gain Info and
XMS Attack
Routers focased on being overwealmed
UNable to process request makes a dos
Gains Info and checks your infrastructure too valueble info
VOIP, TELE,
Social eng Attack
DNS Poisoning
Changes ip addresses
url dns will send to a different website because the dns addresses have been corrupted
Arriving on a ficticious site
Redirected DNS Corup
Pharming Attack
Attack is carried out by corupting hoat files
Redirects the traffic By Corupting HOst Files
Clients- Side Attack
Windows XP, Windows 7, Windows 8
Attack Networks
Machines with client operating systems
Malicious Insider Threat
Been Trusted and have access
Dont just look outside
Very Dangerous
Transitive access attack
exploits trust relationship
Attacks from the client side of the network
Transitive access
URL HIjacking
Type Squatting
Accedental mistyped site name
Different site then you realize and traffic is redirected
Watering hole Attack
Websites people will often go are infected
Malisious person place attack where frequently visit
Social Enginering
Email
Gain info
Spam
Spam over instant messangers and social sites
ARP Poisoning Attack
Redirects ARP COrupt
Whaling