Sistema de blogs Diarium
Universidad de Salamanca
Pablo Gallardo's Blog
My professional web log about IT, Cybersecurity & Project Management
Tag Archives | attack

DLL Side-loading Attack

This post explains what is a DLL side-loading attack in the context of IT security.   What is a DLL Side-loading Attack? A Dynamic Linked Library (DLL) is a file that is used on Windows systems to group functions. By using DLLs, common functionality can be isolated and re-usability is enabled. As DLL are particular […]

Comments { 0 }

List of Web Server Attack Tools

List of web server attack tools metasploit Wfetch THC Hydra HULK DoS MPack w3af Among the most popular, there is metasploit and Wfetch. List of web server attack tools metasploit Wfetch THC Hydra HULK DoS MPack w3af     External references EC-Council; “CEH v10. Module 14 Hacking web servers”, […]

Comments { 0 }

Tools to launch MAC Spoofing Attack

Tools to launch MAC Spoofing Attacks: Technitium MAC Address Changer Source: MAC Address Changer ( Change MAC Address ( GhostMAC ( Spoof-Me-Now ( SpoofMAC ( Win7 MAC Address Changer SMAC One of the most popular is Technitium MAC Address Changer.   Tools to launch MAC Spoofing Attacks Technitium MAC Address Changer MAC Address […]

Comments { 0 }

List of Web Service Attack Tools

List of web service attack tools: SoapUI Pro XMLSpy List of web service attack tools SoapUI Pro SoapUI Pro is a web service testing tool which supports multiple protocols such as SOAP, REST, HTTP, JMS, AMF, and JDBC. Attacker can use this tool to carry out web services probing, SOAP injection, XML injection, and […]

Comments { 0 }

Smurf Attack

Smurf attack, also known as ICMP Echo Request, is a distributed reflection denial of service (DRDoS). Othe examples of DRDoS are DNS poisoning and fraggle attack. Description of smurf attack Smurf attack is performed as follows: First, the malware creates a network packet attached to a false IP address representing the victim — a technique […]

Comments { 2 }

Cybersecurity Attack Phases

According to EC-Council EC-Council identify in the CEH course 5 hacking phases: Reconnaissance Scanning Gaining Access Maintaining Access Clearing Tracks According to ISACA ISACA identify 8 phases in a cybersecurity generalized attack processs: Perform reconnaissance Create attack tools Deliver malicious capabilities Exploit and compromise Conduct an attack Achieve results Maintain a presence or set of […]

Comments { 0 }

Common Cybersecurity Attacks

Non-exhaustive list of common Cybersecurity Attacks: Brute-force Attack Cross-Site Request Forgery (XSRF) Cross-Site Scripting (XSS) Denial of Service (DoS) Man-in-the-middle (MITM) Rogue access point Session hijacking Spoofing of data packets SQL Injection   Detailed List Brute-force Attack A brute-force attack (a.k.a. brute force cracking) is the cyberattack equivalent of trying every key on your key […]

Comments { 0 }
Política de privacidad
Studii Salmantini. Campus de excelencia internacional