Exercise 3 :-
Question :-
Describe the following and explain how it works;
Question :-
Describe the following and explain how it works;
- Sniffing/wiretapping/eavesdropping on network traffic.
- Exploiting security weaknesses(Choose one only)
- Internet Protocol(IP) Spoofing.
- Social engineering.
- Sniffing - Sniffing is peeking someone's information or data through a network and modify it, for example wifi.
- Exploiting security weaknesses - exploiting means taking advantages or benefits from other resources. It come in all shapes and sizes, but some techniques are used more often than others. one of the common website is visiting a website and get tricked by the exploiter.
- Internet Protocol spoofing - Internet protocol is an Ip addresses for a pc, laptop, and even mobile phone, without Ip address, they can not connect through wifi or any internet services. Spoofing means using someone's IP address, start to get rid of it and steal some confidential informations.
- Social engineering - Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.
Comments
Post a Comment