Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 1

DNS CACHE POISONING ATTACK

-Works by tricking a DNS server into acceptong a fake DNS


record that will point you to a compromised DNS server.
It feeds you fake DNS addresses when you try to access
legitimate websites. Also, DNS CACHE POISONING can
spread to other networks too.

MAN-IN-THE-MIDDLE-ATTACK
-Is an attack that places the attacker in the middle of two
hosts that think they're communicating directly with each
other. The common man-in-the-middle attack is a session
or cookie hijacking. Another way a man-in-the-middle attack
can be established is a rogue access point attack.

ROGUE AP
-An access point that is installed on the network w/o the
network administrator's knowledge.
EVIL TWIN - is for you to connect to a network that is
identical to yours. This identical networks
This identical network is our networks eviltwin
and is controlled by our attacker. Attcker will
be able to monitor our traffic.

You might also like