InfoSec

Bookmarks From Information Security Industry

What Is Session Hijacking

f:id:infosec:20190709192535j:plain

Session Hijacking is one of the oldest forms of cyber-attack but is also one that shows no sign of going away. It exploits some of the most basic systems that you rely on online. Because it operates at such a “deep” level, it can be hard to spot and can cause enormous damage.

Luckily, there are some ways to spot session hijacking attacks when they happen, and to limit your vulnerability to them. Learn more about Session Hijacking Attack.

What Is Evil Twin Attack

f:id:infosec:20190709190443j:plain

Evil Twin attacks are almost two decades old now but still pose significant security threats. Evil Twin attacks work in a similar way to a standard phishing scam but are based on Wi-Fi networks.

An attacker will setup a fake Wi-Fi access point, and users will connect to this rather than a legitimate one. When users connect to this access point, all of the data they share with the network will pass through a server controlled by the attacker. Learn more about Evil Twin Attack.

What Is Man In The Middle Attack

f:id:infosec:20190709174327j:plain

A man-in-the-middle attack is a widespread type of WiFi security vulnerability. In this type of attack, an attacker intercepts data passing between two devices but lets them believe that they are still communicating directly (and securely) with each other. Both parties think that they are communicating securely with a remote server, but in fact, all of this traffic is passing through a "man in the middle." Learn more about Man In The Middle Attack.

What is Packet Sniffing

f:id:infosec:20190709005351p:plain

Packet Sniffing is a technique used for snooping on network traffic that network engineers have been using for years. It allows network users and administrators to capture each ‘packet' of data that is transmitted over a network, and then analyze its contents.

Packet sniffing has many legitimate uses. Network engineers can use it to diagnose and troubleshoot network problems or to gather statistics about the performance of a given network.

Unfortunately, it is also used by hackers to steal personal information. Learn more about Packet Sniffing Attack.