IP address spoofing can be used to mask the true origin of an attack. ![]() ARP, DNS, and SSL attacks are very common, along with session hijacking, where the attacker tries to use an already established session from a legitimate user to gain access to a resource. Sometimes that happens passively (just by intercepting traffic) or often actively (entailing some type of interaction with the network). If no encryption is applied, account credentials, credit card information, Social Security numbers, and other sensitive data can be captured and give the attacker a very easy win. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |