English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

4 answers

RAT

2006-12-25 21:16:25 · answer #1 · answered by Jody A 2 · 0 0

Really quick answer, with short descriptions.

Man-in-the-Middle:
A tries to communicate with B, C intercepts A, reads, forwards to B.

IP Spoofing:
Yes, my address is 192.168.1.250! Can I access your server now?

Password Stealing:
A leaves password on post-it note under keyboard. B looks under keyboard and all kinds of fun ensues. (Also: "brute force" -- try every password in a dictionary).

DNS Stealing:
Yes, I am the rightful owner of sex.com! Redirects all traffic to me!

Credentials (private keys) stealing:
A is careless and leaves unprotected

Social Engineering:
"Hi, this is A of the IT Dept., we are changing a few things in the software management to improve the Windows updates. Would you mind telling me your password, so your machine can be updated faster?"

Phishing:
This email is from Yahoo! Answers, please click on the following link to gain 1,000 extra points and a free prize!

Biometry stealing:
Company A uses fingerprint readers to allow person B to access secure facilities. Hacker C obtains B's fingerprints and all manner of fun ensues.

Etc... Etc... Etc... Read the book below for the ultimate list.

2006-12-25 21:27:22 · answer #2 · answered by noryungi 1 · 0 0

Spoofing
///

2006-12-25 21:17:57 · answer #3 · answered by jan 7 · 0 0

malware,spyware,adware,rat,trojan,....
many more re there

2006-12-25 21:20:14 · answer #4 · answered by sweetraskels 4 · 0 0

fedest.com, questions and answers