Login to your account

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *
Reload Captcha
Carl Perkins

Carl Perkins

Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between the two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric is relaying the information between the two. What would you call this attack?

An IT security engineer notices that the company's web server is currently being hacked.
What should the engineer do next?

Which of the following Nmap commands would be used to perform a stack fingerprinting?

John is standing outside a secure entrance to a facility. He is pretending to have a tense conversation on his cell phone as an authorised employee badges in. John, while still on the phone, grabs the door as it begins to close.
What just happened?

Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?

The use of technologies like IPSec can help guarantee the following: authenticity, integrity, confidentiality and

Which of the following steps for risk assessment methodology refers to vulnerability identification?

  1. Popular
  2. Trending
  3. Comments

Recently Popular