what is syn flood attack

What is Syn flood attack? How to Mitigate and Avoid in Future

Syn flood attack: It is type of DOS attack which exploits TCP three way handshake. The attacker sends huge connection requests ( SYN) to server. Server will accept the request for certain time and hold the connection. It will consume all the concurrent connection’s on. Target server will not be available for legit users. It […]

Continue Reading
Man in the Middle attack

What is Man in the Middle Attack ? | Examples MITM Types

What is Man in the middle attack? By this attack Communications between two parties are altered. In short it is called as MITM. Two parties believe they are directly communicating with each other. Attackers interrupts in communications between two parties. It is type of eavesdropping attack It is also a type of session hijacking. Mitigation: […]

Continue Reading
DNS spoofing attack

What is DNS Spoofing Attack? | DNS Tunneling How to Prevent

What is DNS spoofing attack ? Internet traffic is diverted to fake servers Corrupt DNS data is introduce into DNS resolvers cache ( DNS Cache Poisoning) It is also called as DNS poisoning How does DNS Spoofing works? In DNS spoofing attack takes help of DNS server vulnerabilities, traffic is diverted to fake servers away […]

Continue Reading
What is SQL Injection Attack With Example

What is SQL Injection Attack With Example ? Impact | Mitigation

What is SQL Injection With Example? Attacking database and can modify, delete data By commands attack takes place Malicious SQL  statements are inserted into the entry field Should not be executed by external IP Impact: By SQL injection attack in Cyber Security, hackers can get unauthorized access to sensitive data user passwords, personal user information, […]

Continue Reading
What is Cross site scripting attack

What is Cross Site Scripting Attack XSS and CSRF Crucial Terms

What is Cross Site Scripting Attack ? Malicious scripts is injected in the code (user provided inputs) of web applications ( website, website database) Malicious scripts are executed in web browser of victim. Attack by malicious code (payload) in legitimate web applications It is JavaScript vulnerability in Web applications Attacker can steal active session cookie […]

Continue Reading