You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+25-3
Original file line number
Diff line number
Diff line change
@@ -5412,14 +5412,29 @@ You can test by using a stored procedure, so the application must be sanitize th
5412
5412
5413
5413
<details>
5414
5414
<summary>What is DNS Spoofing? How to prevent it?</summary><br><b>
5415
+
5416
+
DNS spoofing occurs when a particular DNS server’s records of “spoofed” or altered maliciously to redirect traffic to the attacker. This redirection of traffic allows the attacker to spread malware, steal data, etc.
5417
+
5418
+
**Prevention**
5419
+
- Use encrypted data transfer protocols - Using end-to-end encryption vian SSL/TLS will help decrease the chance that a website / its visitors are compromised by DNS spoofing.
5420
+
- Use DNSSEC - DNSSEC, or Domain Name System Security Extensions, uses digitally signed DNS records to help determine data authenticity.
5421
+
- Implement DNS spoofing detection mechanisms - it’s important to implement DNS spoofing detection software. Products such as XArp help product against ARP cache poisoning by inspecting the data that comes through before transmitting it.
5422
+
5415
5423
</b></details>
5416
5424
5417
5425
<details>
5418
5426
<summary>What can you tell me about Stuxnet?</summary><br><b>
5427
+
5428
+
Stuxnet is a computer worm that was originally aimed at Iran’s nuclear facilities and has since mutated and spread to other industrial and energy-producing facilities. The original Stuxnet malware attack targeted the programmable logic controllers (PLCs) used to automate machine processes. It generated a flurry of media attention after it was discovered in 2010 because it was the first known virus to be capable of crippling hardware and because it appeared to have been created by the U.S. National Security Agency, the CIA, and Israeli intelligence.
5429
+
5430
+
5419
5431
</b></details>
5420
5432
5421
5433
<details>
5422
5434
<summary>What can you tell me about Spectre?</summary><br><b>
5435
+
5436
+
Spectre is an attack method which allows a hacker to “read over the shoulder” of a program it does not have access to. Using code, the hacker forces the program to pull up its encryption key allowing full access to the program
5437
+
5423
5438
</b></details>
5424
5439
5425
5440
<details>
@@ -5430,9 +5445,6 @@ You can test by using a stored procedure, so the application must be sanitize th
@@ -5480,6 +5492,10 @@ HTTP Header Injection vulnerabilities occur when user input is insecurely includ
5480
5492
5481
5493
<details>
5482
5494
<summary>Explain what is Buffer Overflow</summary><br><b>
5495
+
5496
+
A buffer overflow (or buffer overrun) occurs when the volume of data exceeds the storage capacity of the memory buffer. As a result, the program attempting to write the data to the buffer overwrites adjacent memory locations.
5497
+
5498
+
5483
5499
</b></details>
5484
5500
5485
5501
##### Containers
@@ -5497,6 +5513,9 @@ HTTP Header Injection vulnerabilities occur when user input is insecurely includ
5497
5513
5498
5514
<details>
5499
5515
<summary>Explain MAC flooding attack</summary><br><b>
5516
+
5517
+
MAC address flooding attack (CAM table flooding attack) is a type of network attack where an attacker connected to a switch port floods the switch interface with very large number of Ethernet frames with different fake source MAC address.
5518
+
5500
5519
</b></details>
5501
5520
5502
5521
<details>
@@ -5509,6 +5528,9 @@ HTTP Header Injection vulnerabilities occur when user input is insecurely includ
5509
5528
5510
5529
<details>
5511
5530
<summary>What is Cache Poisoned Denial of Service?</summary><br><b>
5531
+
5532
+
CPDoS or Cache Poisoned Denial of Service. It poisons the CDN cache. By manipulating certain header requests, the attacker forces the origin server to return a Bad Request error which is stored in the CDN’s cache. Thus, every request that comes after the attack will get an error page.
0 commit comments