spoofing
In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully masquerades as another by falsifying data, to gain an illegitimate advantage.
spoofing
In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully masquerades as another by falsifying data, to gain an illegitimate advantage.
Phishing
Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communicatio
Createdin 1971 byRayTomlinson (1941-2016)
Creation of Email
%WinDir%\System32\Drivers\Etc
Location of hosts file in windows
2.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.1.0.0.0.1.0.0.e.d.c.b.a.2.0.0.1.ip6.arpa
Inverted domain IPv6 example
15.4.0.192.in-addr.arpa
Inverted domain IPv4 example
DNS hijack
DNS hijacking or DNS redirection is the practice of subverting the resolution of Domain Name System (DNS) queries. This can be achieved by malware that overrides a computer's TCP/IP configuration to point at a rogue DNS server under the control of an attacker, or through modifying the behaviour of a trusted DNS server so that it does not comply with internet standards
Exemplo
Example of SRV