Threat And Attack Terminology Address Resolution Protocol (ARP) : Protocol Used to map known IP Address to unknown physical address. ARP Poisoning : An attack that convince the network that the address's MAC address is the one associated with an allowed address so that traffic is wrongly sent to attacker's address. Adware: Software that gather information to pass on marketers or that intercepts personal data such as credit card numbers and makes it available to third parties. Armored virus: The virus that protected in a way that makes disassembling it difficult. Antivirus program that have trouble getting to,and understanding , its code. Attack Surface: The area of an application that is available to the user, those are authenticated and , more imortantly, those who are not. Attack surface reduction (ASR): Minimizing the possibility of exploitation by reducing the amount of code and limiting potential damage. Buffer Overflow: A type of DOS attack that when occu...
Posts
- Get link
- X
- Other Apps
Smurf Attack What is a Smurf attack Smurf is a network layer distributed denial of service (DDoS) attack, named after the DDoS.Smurf malware that enables it execution. Smurf attacks are somewhat similar to ping floods , as both are carried out by sending a slews of ICMP Echo request packets. Unlike the regular ping flood, however, Smurf is an amplification attack vector that boosts its damage potential by exploiting characteristics of broadcast networks. Attack description In a standard scenario, host A sends an ICMP Echo (ping) request to host B, triggering an automatic response. The time it takes for a response to arrive is used as a measure of the virtual distance between the two hosts. In an IP broadcast network, an ping request is sent to every host, prompting a response from each of the recipients. With Smurf attacks, perpetrators take advantage of this function to amplify their attack traffic. Here's How a Smurf attack works...
Cyber Threats
- Get link
- X
- Other Apps
Cyber Threats Malware is the collective name for a number of malicious software variants, including viruses, ransomware and spyware. Shorthand for malicious software, malware typically consists of code developed by cyberattackers, designed to cause extensive damage to data and systems or to gain unauthorized access to a network. Malware is typically delivered in the form of a link or file over email and requires the user to click on the link or open the file to execute the malware. Malware has actually been a threat to individuals and organizations since the early 1970s when the Creeper virus first appeared. Since then, the world has been under attack from hundreds of thousands of different malware variants, all with the intent of causing the most disruption and damage as possible. Malware : Malware, short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use ...
ACTIVE DIRCTORY
- Get link
- X
- Other Apps
What is active directory? Directory service is developed by Microsoft to manage windows domain networks. Store information related to objects, such as computer, user,printers etc. Its like a phone book to windows. Authenticate using users Kerberos ticket. Non-windows devices, such as Linux machines, firewalls, etc. Can also authenticate to Active Directory via RADIUS or LDAP. Why is active directory? Active Directory is the most commonly used identity management service in the world. 95% of fortune 1000 companies implement the service in their networks. Can be exploited without ever attacking patch able exploits. Benefits of Active Directory Active Directory simplifies life for administrators and end users while enhancing security for organizations. Administrators enjoy centralized user and rights management, as well as centralized control over computer and user configurations through the AD Group Policy feature. Users can authenticate onc...
Buffer Overflow Attack
- Get link
- X
- Other Apps

Buffer Overflow In information security and programming , a buffer overflow , or buffer overrun , is an anomaly where a program , while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations. Buffers are areas of memory set aside to hold data, often while moving it from one section of a program to another, or between programs. Buffer overflows can often be triggered by malformed inputs; if one assumes all inputs will be smaller than a certain size and the buffer is created to be that size, then an anomalous transaction that produces more data could cause it to write past the end of the buffer. If this overwrites adjacent data or executable code, this may result in erratic program behavior, including memory access errors, incorrect results, and crashes. Buffer Overflow Attack Attackers exploit buffer overflow issues by overwriting the memory of an application. This changes the execution path of the program, triggering a ...