One of the most common stealth attack types is creating a fake wireless access point. This attack is common because it; Leverages people’s desire for free WiFi The software required to do it is widely available for free on the internet and, Much sensitive data is passed through wireless networks in the form of unencrypted […]
Stealth Attack Types: Host File RedirectionHost file redirection is a stealth attack technique that rightfully falls into the ‘simple genius’ category. Most computer users today are unaware of a Windows DNS-related file named Hosts. (You can find it on your own machine here: C:\Windows\System32\Drivers\Etc ) The ‘Hosts’ file acts somewhat like a local DNS server in that it contains a […]
Stealth Attack Types: Cookie TheftAnother stealth attack type is browser cookie theft. It is said that browser cookies make the web run. Simply put, cookies preserve the action ‘state’ of the user as you surf through the internet. These little pieces of text are sent to our web browser from the websites we frequent making it easier to login, […]
Stealth Attack Types: Renaming File Names and ExtensionsPerhaps the oldest stealth hacking technique involves changing and altering file names and file extension types. The earliest examples took advantage of a major Microsoft Windows weakness whereby Windows would hide different types of file name extensions. This made it easier to send phishing bait that the user would readily click. For example, a hacker […]
Definition of the Day: Spear PhishingWhen hackers target small and medium-sized businesses they are increasingly doing so in a more targeted way. Whereas phishing attacks cast a wide net hitting many potential targets, spear phishing gets more to the point. So, what is spear phishing? Spear phishing is an email scam that targets a smaller group or organization in a […]