Hamburger Menu
EH
Question Mark Circled
Cross 1
Introduction
Brief
Common Techniques
Prevention
End
Common Penetration Techinques:
Click on each one to know more
Fake WAP
Bait and switch
Credential reuse
SQL injection
Browser locker
Macro malware in documents
Cookie theft / sidejacking / session hijacking
IoT attacks
DDoS attacks
Phishing
Clickjacking/UI redress
Man-in-the-middle attack
Cross-site scripting
DNS spoofing
Watering hole attack
Keylogger attack
Brute force attack
Dictionary attack
Arrow Right