Rainbow table: It is a pre computed table for reversing cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a plaintext password up to a certain length consisting of a limited set of characters.
Ransaomware: The system that doesn’t allows users to proceed until the payment is done is generally known as Ransaomware.
RAT programmes: RAT stands for ¨Remote Administrative Tool¨, it is a malware software, that allows a remote operator to control a system.
RCE vulnerability: It is the ability to trigger code execution from one machine on another.
Reflected (non-persistent) XSS: It is also known as reflected XSS, it is one of the three major categories of XSS attacks.
Remote exploit: A remote
…show more content…
Reverse telnet / ssl / connection: It is a application of telnet, here the server side of the connection reads and writes data to a computer terminal line rather than providing a command shell to the host device.
Rouge AP: it stands for ¨ Rogue Access Point¨, it is a wireless access point installed on a wired enterprise network without authorization from the network administrator.
Rogue DHCP: Rogue DHCP stands for ¨Dynamic Host Configuration Protocol¨ server, it is a DHCP server on a network which is not under the administrative control of the network staff.
Rootkit: It inject malware to the computer in order to get root access to computer or other device.
Sandboxing: It is a computer security term referring to when a program is set aside from other programs in a separate environment so that if errors or security issues occur, those issues will not inject to other areas on the computer.
Script kiddie: Script kiddie are unskilled persons who uses scripts or programs developed by others to attack computer systems and networks and deface
…show more content…
Tunneling: It is the protocol that allows the secure movement of data from one network to another.
UDP amplification DNS: DNS is attacks in which an attacker delivers traffic to the victim of their attack by reflecting it off of a third party so that the origin of the attack is concealed from the victim. It is substantially easier for an attacker to spoof their source address with UDP.
Virtual machine: It’s a self-contained operating environment that behaves as if it is a separate computer.
VPN: Sometimes when we share something over public network, many attack can be faced but if we use VPN it creates platform like private networking over public networks.
War driving: War driving refers to the searching for WIfi network while being moving in vehicle.
White hat: It refers to the ethical computer hacker who specializes in penetration testing and in other testing methodologies to ensure the security of an organizations information systems.
Wifi WPS: It stands for “Wi-Fi Protected Setup” and provides simplified mechanisms to configure secure wireless