Tuesday 12 July 2022

Eavesdropping Attack

Eavesdropping attacks occur through the interception of network traffic. An attacker can obtain passwords, credit card numbers, and other confidential information that a user might be sending over the network by eavesdropping. Eavesdropping can be passive or active. Passive eavesdropping — A hacker detects the information by listening to the message transmission in the network.

Active eavesdropping — A hacker actively grabs the information by disguising himself as a friendly unit and sending queries to transmitters. This is called probing, scanning, or tampering. read more



No comments:

Post a Comment

Google Launches GUAC Open Source Project to Secure Software Supply Chain

Google on Thursday announced that it's seeking contributors to a new open-source initiative called Graph for Understanding Artifact Comp...