Cyber Security 138
What you need to know about Malicious iFrames
In today’s Net, few of the most worldly web-based threats are intentional to hide in unornamented compass on rightful web sites. Most web malware consists of spiteful scripts that are concealed inner inline frames, which are famous as iFrames. Warrantee analysts should be fit to sight any iFrames within the HTTP packet load during incident […]
How web-based attack works
Today, employees are expected to do sector anywhere and with any twist, challenging conventional precaution and deployment models. The uncontrolled use of friendly media and Web 2.0 applications by employees opens the entryway to web malware, assemblage precaution probability, and fruitfulness going. Blocking web browsing completely is not an choice because businesses requisite to command […]
Basic of DNS tunneling
In 2011, botnets began using DNS reciprocation to covertly hole taken collection. Botnets use their own DNS services to proxy subject from infected devices to botnet controllers. This substance explains how DNS has played an progressively desperate role in the evolution of botnets, including some hairy new CnC techniques that hands added used protocols: IRC, […]
Basic of DNS-Based Attacks
Without DNS, the Internet could not easily function in the user-friendly way that people are used to. DNS plays a crucial role in cybersecurity, as DNS servers are susceptible to being attacked and used as a common attack vector. The Cisco 2016 Annual Security Report analysis of malware that had been validated as “known bad,” found […]
Basic of Pass-the-Hash Attacks
The pass-the-hash attack is another password attack that security analysts should be familiar with. This topic discusses the use of a password hash, and how attackers can steal the password hash to make lateral attacks. Hash cryptography algorithms are one-way functions. Hashing takes any amount of data and produces a fixed-length “fingerprint” of the data […]
Find Us on Facebook
Choose a category !!
- CCNA
- Cisco Certification Exam
- cisco packet tracer 6.2
- Cisco packet tracer 6.3
- Cisco Packet Tracer 7
- Cisco Packet Tracer 7.1
- Cisco Packet Tracer 7.2.1
- Cisco Packet Tracer 7.3
- Cyber Security
- Engineering Ebooks
- Excel
- IELTS Ebook
- Internet
- Know computer
- Know your computer
- Laser Processing of Material
- Linux installation and server management
- Technology
- Uncategorized