ipl-logo

Nt1330 Unit 7

878 Words4 Pages

Rainbow table: It is a pre computed table for reversing cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a plaintext password up to a certain length consisting of a limited set of characters.

Ransaomware: The system that doesn’t allows users to proceed until the payment is done is generally known as Ransaomware.

RAT programmes: RAT stands for ¨Remote Administrative Tool¨, it is a malware software, that allows a remote operator to control a system.

RCE vulnerability: It is the ability to trigger code execution from one machine on another.

Reflected (non-persistent) XSS: It is also known as reflected XSS, it is one of the three major categories of XSS attacks.

Remote exploit: A remote …show more content…

Reverse telnet / ssl / connection: It is a application of telnet, here the server side of the connection reads and writes data to a computer terminal line rather than providing a command shell to the host device.

Rouge AP: it stands for ¨ Rogue Access Point¨, it is a wireless access point installed on a wired enterprise network without authorization from the network administrator.

Rogue DHCP: Rogue DHCP stands for ¨Dynamic Host Configuration Protocol¨ server, it is a DHCP server on a network which is not under the administrative control of the network staff.

Rootkit: It inject malware to the computer in order to get root access to computer or other device.

Sandboxing: It is a computer security term referring to when a program is set aside from other programs in a separate environment so that if errors or security issues occur, those issues will not inject to other areas on the computer.

Script kiddie: Script kiddie are unskilled persons who uses scripts or programs developed by others to attack computer systems and networks and deface …show more content…

Tunneling: It is the protocol that allows the secure movement of data from one network to another.

UDP amplification DNS: DNS is attacks in which an attacker delivers traffic to the victim of their attack by reflecting it off of a third party so that the origin of the attack is concealed from the victim. It is substantially easier for an attacker to spoof their source address with UDP.

Virtual machine: It’s a self-contained operating environment that behaves as if it is a separate computer.

VPN: Sometimes when we share something over public network, many attack can be faced but if we use VPN it creates platform like private networking over public networks.

War driving: War driving refers to the searching for WIfi network while being moving in vehicle.

White hat: It refers to the ethical computer hacker who specializes in penetration testing and in other testing methodologies to ensure the security of an organizations information systems.

Wifi WPS: It stands for “Wi-Fi Protected Setup” and provides simplified mechanisms to configure secure wireless

More about Nt1330 Unit 7

Open Document