Select Page

Attacks, Malware, and Malicious Activities Overview

CISSP

  1. ARP Spoofing
    • Definition: An attack where a malicious actor sends falsified ARP messages within a local network, misdirecting traffic to the attacker’s machine.
  2. Bluejacking
    • Definition: The act of sending unsolicited messages via Bluetooth to nearby devices.
  3. Bluesnarfing
    • Definition: An attack that targets data or information on Bluetooth-enabled devices, allowing unauthorized access to sensitive information.
  4. CAIN Attack
    • Context: Likely refers to attacks facilitated by the Cain & Abel tool, which is used for password recovery and network traffic interception.
  5. DNS Spoofing
    • Definition: An attack where an attacker sends false DNS replies to a system, potentially redirecting traffic to a malicious destination.
  6. DNS Poisoning
    • Definition: An attack that changes the domain name to IP address mappings of a system, redirecting traffic to alternative, usually malicious, systems.
  7. RDP (Remote Desktop Protocol)
    • Definition: A protocol that allows users to connect to another computer remotely, providing terminal sessions without physical access.
  8. Screenscraper
    • Definition: A method of copying the content displayed on a screen, often used in conjunction with remote control attacks.
  9. SPIT Attacks (Spam over Internet Telephony)
    • Definition: An attack targeting VoIP systems by flooding them with spam calls or messages.

These concepts are essential for understanding different types of network attacks and vulnerabilities, particularly in the context of securing communication and data integrity across various platforms.

Latest Post:

Pin It on Pinterest