Category: Resources

DNS Spoofing

Assuming the DNS (Domain Name System) name of another system by either corrupting the name service cache of a victim...

Promiscuous Mode

A mode of operation where a device is configured to receive all data on a network regardless of its destination...

Spam

Irrelevant or inappropriate messages sent via email to a large number of recipients.  

Network

Two or more computers which are connected.

WAN

Wide Area Network. A network that provides capabilities for a number of independent devices to communicate with each other over...

Smartphone

An electronic handheld device that functions as a mobile telephone, but also provides additional information accessing features, such as email...

TCP/IP

TCP/IP is the communication protocol for the Internet, and defines the rule computers must follow to communicate with each other...

LAN

A local area network, which is a local computer network for communication between computers, especially computers and word processors and...

Mass Meshing

Also known as mass SQL injection, this is a method whereby hackers poison websites by illegally imbedding a redirection javascript...

IDN Spoofing

IDN (Internationalized Domain Name) Spoofing, also known as IDN homograph attack, is a way in which a malicious party may...

Wardriving

Wardriving is the act of searching for wifi wireless networks by a person in a moving vehicle, using a portable...