A denial-of-service (DoS) attack is a type of cyber-attack in which a malicious actor goals to render a computer or other device unavailable to its planned users by disturbing the…
HACKING
Sniffing is a process of capturing and monitoring all data packets passing through given network. Sniffers are used by system/network administrator to monitor and troubleshoot network traffic. Attackers use sniffers…
It is defined as taking over an active TCP/IP communication session without the user’s permission. When executed successfully, attackers undertake the uniqueness of the compromised user, liking the same access…
System hacking It is defined as the compromise of computer systems and software to access the target computer and steal or misuse their sensitive information. Here the malicious hacker exploits…
What is Vulnerability ? It is defined as an issue in the software code that a hacker can exploit to damage the systems. It can be a gap in the…
Enumeration in Ethical Hacking Enumeration is one of the phases of Penetration Testing or Ethical Hacking. It is a process of gaining complete access to the system by cooperating the…
Scanning is a set of procedures for finding live hosts, ports, and services, discovering Operating system and architecture of target system, Finding vulnerabilities and threats in the network. Scanning refers…
What is Footprinting ? Footprinting is a part of the Inspection phase of Ethical Hacking in which you gather information about the system/ application. The main goal of Footprinting is…
Online dating is more popular than at any other point in human history. It has far surpassed the likes of other traditional dating methods like speed dating or blind dating….
As our existence in the digital world keeps getting more prominent, our need to store our data also keeps increasing. The need for larger storage spaces is also expanding. So,…