Network and Wireless Attacks
Click-jacking: tricking a web user into clicking a spoofed button or graphic. Session hijacking (Cookie hijacking): exploiting a valid computer […]
Network and Wireless Attacks Read Post »
Click-jacking: tricking a web user into clicking a spoofed button or graphic. Session hijacking (Cookie hijacking): exploiting a valid computer […]
Network and Wireless Attacks Read Post »
Application Attacks Buffer overflow Injection Cross-site scripting (XSS) Cross-site request forgery (CSRF or XSRF) Privilege escalation Search “OWASP top ten”
Threats, Attacks and Vulnerabilities Read Post »
Definition: The process by which intruders gain access to facilities, network, systems, data and even employees by exploiting the generally
Social Engineering Read Post »
Compare and Contrast type of attacks Social Engineering Phishing, Spear Phishing , Whaling, Vishing, Tailgating, Impersonation, Dumpster Diving, Shoulder
Types of Cyber Attacks Read Post »
Types of Malware Viruses Crypto Malware Ransomware Worm Trojan Rootkit Keylogger Adware Spyware Bots RAT Logic bomb Backdoor Malware Attacks
Understand correct locations of files under the FHS. Find files and commands on a linux system. Know the location and
104.7 Find System Files and Place files in correct location Read Post »
Create links Identify hard and soft links. Copying versus linking files. Use links to support system administration tasks. Commands :
104.6 Create and Change hard-symbolic links Read Post »
Manage access permissions on regular and special files as well as directories. Use Access Modes such as SUID, SGID and
104.5 Manage file permissions and ownership Read Post »
Commands : quota, edquoata, repquota, quotation Setup Disk quota for the filesystem Disk quotas enables set storage limits for and
104.4 Manage Disk Quotas Read Post »
Manually mount and un-mount filesystems The mount and umount commads attach and detach filesystems to a mountpoint directory Mount checks
104.3 Control mounting and un-mounting of Filesystem Read Post »