Hamburger Menu

EH

Question Mark Circled
Cross 1
Introduction Brief Common Techniques Prevention End

Common Penetration Techinques:

Click on each one to know more

  • Fake WAP
  • Bait and switch
  • Credential reuse
  • SQL injection
  • Browser locker
  • Macro malware in documents
  • Cookie theft / sidejacking / session hijacking
  • IoT attacks
  • DDoS attacks
  • Phishing
  • Clickjacking/UI redress
  • Man-in-the-middle attack
  • Cross-site scripting
  • DNS spoofing
  • Watering hole attack
  • Keylogger attack
  • Brute force attack
  • Dictionary attack
Arrow Right