Category: Resources

DNS Spoofing

Assuming the DNS (Domain Name System) name of another system by either corrupting the name service cache of a victim...

Promiscuous Mode

A mode of operation where a device is configured to receive all data on a network regardless of its destination...

Spam

Irrelevant or inappropriate messages sent via email to a large number of recipients.  

Network

Two or more computers which are connected.

WAN

Wide Area Network. A network that provides capabilities for a number of independent devices to communicate with each other over...

Smartphone

An electronic handheld device that functions as a mobile telephone, but also provides additional information accessing features, such as email...

LAN

A local area network, which is a local computer network for communication between computers, especially computers and word processors and...

TCP/IP

TCP/IP is the communication protocol for the Internet, and defines the rule computers must follow to communicate with each other...

IDN Spoofing

IDN (Internationalized Domain Name) Spoofing, also known as IDN homograph attack, is a way in which a malicious party may...

Mass Meshing

Also known as mass SQL injection, this is a method whereby hackers poison websites by illegally imbedding a redirection javascript...

Wardriving

Wardriving is the act of searching for wifi wireless networks by a person in a moving vehicle, using a portable...