12/28/2022 0 Comments Tutorial wireshark 2.0As you know,in order to communicate with other computers, each computer needs an IP. Please look at the below picture.Īddress Spoofing: I know that you know what an IP (Internet Protocol) address is. It may seem old, but you can be sure it is one of the biggest security problems in a network that network administrators disregard. When you chat with your friend in “clear text” mode, sniffing your traffic is possible. This kind of attack happens in computer communications, too, but it's known as sniffing. A very simple way is to secretly listen to their words. Imagine that you want to find some information about two friends and their relationship. I will show you some texts about the above options and introduce other attacks to you.Įavesdropping: I'm sure you are familiar with it it's very normal in life. I want to familiarize you with different types of active and passive attacks: This attack is more like monitoring and recognition of the target. Passive attack: In this kind of attack, The Attacker attempts to gain information from the system without destroying the information. An attack can be active or passive:Īctive attack: In this kind of attack, The Attacker attempts to alter system resources or destroy the data. Attacks are not always simple most of them are complex and it is a big challenge for security researchers and companies that offer a solution for them. An attacker is a person that steals your data without permission and a feature of some attacks is that they are hidden. In the computer world, an attack is a way to destroy, expose and gain unauthorized access to data and computers. We have published new article about Ettercap.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |