Article in International Journal of Computer Networks and Communications Security · June 016 citations 56 reads 15,158 authors: Some of the authors of this publication are also working on these related projects



Download 274,58 Kb.
Pdf ko'rish
bet18/28
Sana17.05.2023
Hajmi274,58 Kb.
#940219
1   ...   14   15   16   17   18   19   20   21   ...   28
Bog'liq
CybercrimeandCybercriminal-2016

2.54 War chalking
:
This technique is used to place 
special symbols on sidewalks or walls indicating an 
open Wi-Fi network.
2.55 War driving
:
Attackers drive around to 
discover wireless networks for future exploits. 
Cantennas (Open-ended metal can antennae) are 
used to detect Wi-Fi networks. 
2.56 Watering hole
:
This attack identifies an 
organization website, exploits web vulnerabilities 
and installs malware that attacks silently the users. 
2.57 WEP/WPA attacks
:
These Wired Equivalent 
Privacy/ Wi-Fi Protected Access attacks use 
cracking tools to break 802.11 WEP secret keys. 
40-bit to 512-bit keys can be cracked from captured 
data packets. 
2.58 Whaling
:
Whaling is a spear phishing attack 
that aims upper management executives. This 
attack targets a top executive by name using some 
kind of legal subpoena or customer complaint. 
2.59 Wire sniffing
:
This is a form of an active or 
passive wiretapping attack that monitors data traffic 
or alters data packets as required. Some vulnerable 
protocols to sniffing are HTTP, IMAP, Telnet, 
POP, FTP, SMTP and NNTP. Some measures to 
defend sniffing include physical restrictions, 
encryption, use of static IP addresses and IPv6 
configuration. 
2.60 WPS attacks
:
Wi-Fi Protected Setup use 
buttons to connect to wireless networks and a 
secure WPA link. This Pin attack sets up a brute 
force method to crack into a WPA wireless 
network. Some countermeasures include disabling 
WPS or updating the access point firmware. 
2.61 Xmas attack
:
The Christmas tree attack is a 
port scan type used as a reconnaissance attack and 
the gathered information is crucial for further 
cyberattacks. The particular features are the 
inclusion of bit sets and flags in the TCP packet 
header that will trigger responses about open ports.

Download 274,58 Kb.

Do'stlaringiz bilan baham:
1   ...   14   15   16   17   18   19   20   21   ...   28




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish