Вы находитесь на странице: 1из 2

IP Spoofing: The term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP)

packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of
the sender or impersonating another computing system. IP spoofing is most frequently used in denial-of-
service attacks

buffer overflow : buffer overflow, or buffer overrun, is an anomaly where a program, while
writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory. Buffer
overflows can be triggered by inputs that are designed to execute code, or alter the way the
program operates. This may result in erratic program behavior, including memory access errors,
incorrect results, a crash, or a breach of system security. Programming languages commonly
associated with buffer overflows include C and C++, which provide no built-in protection against
accessing or overwriting data in any part of memory and do not automatically check that data
written to an array is within the boundaries of that array.

Session hijack: session hijacking is the exploitation of a valid computer session—sometimes also called a
session key—to gain unauthorized access to information or services in a computer system. In particular, it
is used to refer to the theft of a magic cookie used to authenticate a user to a remote server. It has
particular relevance to web developers, as the HTTP cookies used to maintain a session on many web
sites can be easily stolen by an attacker using an intermediary computer or with access to the saved
cookies on the victim's computer

Frame spoofing: Basically, the Frames Spoof is a "spoofing" attack that allows attackers to insert
unauthorized content into the frames of other Websites. Every frames-based Website is vulnerable.

D-DOS -> a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is
an attempt to make a machine or network resource unavailable to its intended users. One common
method of attack involves saturating the target machine with external communications requests, so
much so that it cannot respond to legitimate traffic.

DNS Spoofing: DNS spoofing (or DNS cache poisoning) is a computer hacking attack, whereby
data is introduced into a Domain Name System (DNS) name server's cache database, causing the
name server to return an incorrect IP address, diverting traffic to another computer (often the
attacker's).

Cross-site scripting: The expression "cross-site scripting" originally referred to the act of loading the
attacked, third-party web application from an unrelated attack site, in a manner that executes a fragment
of JavaScript prepared by the attacker in the security context of the targeted domain

Brute Force: Such an attack might be utilized when it is not possible to take advantage of other
weaknesses in an encryption system (if any exist) that would make the task easier. It consists of
systematically checking all possible keys until the correct key is found. In the worst case, this
would involve traversing the entire search space.

Вам также может понравиться