Phishing is an act where an attacker impersonates as a legitimate person or entity and deceives a target to get sensitive information by sending emails, texts, SMS or having voice calls. The following are different techniques used in phishing attack.
Category: Exploitation
Buffer Overflow
Buffer Overflow is a vulnerability in software due to improper boundary checks, where an attacker exploits the target system by writing overwhelming data to the software memory buffer to overflow the buffer’s capacity and then making the malicious data to be written in the adjacent memory location giving un-authorized access. There are two types of…