Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Category: Hacking

Wi-Fi Wireless Hacking Methodology

Posted on by

Wi-Fi uses wireless for communication in an open space which makes it easy target for attackers. Wi-Fi Network is available almost everywhere at streets, organizations, public infrastructure. An attacker just needs a computing device like a laptop or mobile to hack a Wi-Fi network. The following is the Wi-Fi wireless hacking methodology: Discover the Wi-Fi…

Read more

SQL Injection (SQLi) Attack

Posted on by

SQL Injection (SQli) is an attack technique where the attacker exploits the vulnerability in Web Application of not validating inputs and injects malicious SQL statements into the Relative Databases (RDMS). Web Application is a 3-Tier Architecture. A user accesses the web server and the data from the web server is provided to the application server….

Read more

Indicator of Intrusion (IoI)

Posted on by

Indicator of Intrusion is the indicator that an intruder had gained or made attempts to gain un-authorized access to a system. Types of Indicator of Intrusion File System Intrusion By observing and assessing files in the system, we can detect intrusion by the following ways: Network Intrusion Indicator By monitoring the network activity, we can…

Read more

Session Hijacking

Posted on by

Session Hijacking is an act, where an attacker takes the control of an existing network or application session between two systems and gets the access to un-authorized information from the session. The end users who own the systems whose session has been hijacked are not aware that their session has been hijacked. Types of Session…

Read more

DoS And DDoS

Posted on by

DoS (Denial of Service) Attack DoS (Denial of Service) is the act, where an attacker makes a computer or network un-available to the users. It is done by flooding the computer or network with huge traffic which depletes the available resources which are CPU, Memory for a computing system and bandwidth for a network and…

Read more

Botnet

Posted on by

Botnet also known as roBOT NETwork is a network of compromised computers called bots also known as zombies that are infected with malware (virus, worms, trojan) and controlled remotely by a attacker. The bots in the network are controlled by the attacker and used to perform attacks DDoS (Distributed Denial of Service attack), data theft, data mining,…

Read more

Computer Zombies (Bots)

Posted on by

Zombies also known as Bots are computers that are connected to Internet which have been compromised by malware (viruses, worms, trojans) and is controlled remotely by an attacker. Attackers use Zombie is used to attack a target. The Zombie act individually but are mostly part of a bigger group known as Botnet. Attacker use Botnet…

Read more

Phishing

Posted on by

Phishing is an act where an attacker impersonates as a legitimate person or entity and deceives a target to get sensitive information by sending emails, texts, SMS or having voice calls. The following are different techniques used in phishing attack.

Read more

Sniffing

Posted on by

Sniffing is the act of monitoring and capturing the network traffic. An attacker sniffs the network traffic by inserting a software or hardware into the network between the sender and receiver. Sniffing is also referred as Network Sniffing which is a type of Eavesdropping. Types of Sniffing Passive Sniffing is where the attacker passively listens…

Read more

Eavesdropping

Posted on by

Eavesdropping is the act of intercepting the conversation between two systems. A hacker intercepts the session between two machines. After interception, the attacker can gain access to data or modify the data or delete the data. The interception can be simple as like over hearing two people talking or sophisticated like intercepting an application session…

Read more
  • 1
  • 2
  • 3
  • Next

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme