Register Now

Login

Lost Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Captcha Click on image to update the captcha .

Add post

You must login to add post .

Login

Register Now

Lorem ipsum dolor sit amet, consectetur adipiscing elit.Morbi adipiscing gravdio, sit amet suscipit risus ultrices eu.Fusce viverra neque at purus laoreet consequa.Vivamus vulputate posuere nisl quis consequat.

Tipos de amenazas y ataques

Difunde No Solo Hacking!

A continuación una clasificación de las diferentes amenazas y ataques:

Network threats:

  • compromised key attack
  • denial-of-service(DoS) attacks
  • DNS and ARP poisoning
  • firewall and IDS attacks
  • information gathering
  • password-based attacks
  • session hijacking and man in the middle attacks
  • sniffing and eavesdropping
  • spoofing

Host threats:

  • arbitrary code execution
  • backdoor attacks
  • denial of service attacks
  • footprinting
  • malware attacks
  • password attacks
  • physical security threats
  • privilege escalation
  • unauthorized access

Application threats:

  • authentication and authorization attacks
  • broken session management
  • buffer overflow issues
  • cryptography attacks
  • improper data/input validation
  • improper error handling and exception management
  • information disclosure
  • security misconfiguration
  • SQL injection

Difunde No Solo Hacking!

About Carlos Melantuche


Follow Me

Leave a reply

error: ooops!