Please enable JavaScript.
Coggle requires JavaScript to display documents.
Network Attacks - Coggle Diagram
Network Attacks
Social Engineering
Vishing
the fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers.
Impersonation
the ability of a thread to execute using different security information than the process that owns the thread
-
Dumpster Diving
a technique used to retrieve information that could be used to carry out an attack or gain access to a computer network from disposed items.
Phishing/Spear Phishing
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Social Surfing
an innovative concept which helps develop a safe and sensitive online environment by empowering the users
Cryptographic Attacks
-
Rainbow Tables
a password cracking method that uses a special table (a “rainbow table”) to crack the password hashes in a database
-
Brute Force
a cryptographic hack that relies on guessing possible combinations of a targeted password until the correct password is discovered
Pass The Hash
a technique whereby an attacker captures a password hash (as opposed to the password characters) and then simply passes it through for authentication and potentially lateral access to other networked systems
-
-