Posts

Showing posts from June, 2020

CEH 8-Sniffing

Image
↑ Previous Page Next Page What is Sniffing? Sniffing is the process of monitoring and capturing all data packets passing through a given network.  Sniffing is a form of wiretap applied to computer networks.  We can sniff data packets using tools like Wireshark. We can sniff data from wired networks or wireless networks. Any protocol that do not encrypt data are vulnerable to sniffing attacks. Attackers use sniffers to capture data packets containing sensitive information such as passwords, account information, etc.  Sniffers works in the Datalink Layer. Disclaimer: The articles provided on HackWithV is purely for informational and educational purpose only, and for those who are willing and curious to know & learn about Ethical Hacking, Security and Penetration Testing. Anytime the word "Hacking" that is used on this site shall be regarded as Ethical Hacking. Types of sniffing: Sniffing is classified into two types base

CEH 7-Malware Threats

Image
↑ Previous Page Next Page What is Malware? Malware: Mal means Malicious, ware means Software. Simply, malware means malicious software. It is a type of program that combines malicious code with genuine application. It is used to perform unauthorized operations. It can take control of a system or cause damage. Disclaimer: The articles provided on HackWithV is purely for informational and educational purpose only, and for those who are willing and curious to know & learn about Ethical Hacking, Security and Penetration Testing. Anytime the word "Hacking" that is used on this site shall be regarded as Ethical Hacking. Types of Malware: Trojan Virus Worm Rootkits Spyware Ransomware Adware Backdoor 1. Trojan Trojan is a malicious program. It is bound with a harmless application program or data. It can help an attacker to gain control and cause damage to the targeted machine.  Malware tries to steal victims confide