answersLogoWhite

0


Best Answer

Phishing.

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What typically involves using client-side scripts written in JavaScript that are designed to extract information from the victim and then pass the information to the attacker?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Engineering

Attackers use buffer overflows to?

point to another area in data memory that contains the attacker's malware code


Why do you need different scripting for client and server side?

Partly because the available scripting languages are different: JavaScript runs primarily in the browser, which server side languages like PHP, JSP, Ruby on Rails etc. cannot do.Partly because the tasks are different: The server may do things like database lookup, reading/writing files and user authentication that would be either impossible or very insecure to do in a browser.That said, there are a number of tasks that can be done either on the client or the server, like generating the HTML for the page.There are also a couple of tasks that are commonly done both places, like form validation - on the client to give quick feedback and on the server to ensure that what is submitted is actually safe and valid. (An attacker could easily skip any browser validation and submit illegal values.)If you wish to share as much code between client and server as you can, server side JavaScript exists, so it is possible to use the same language both places. There will still be different scripting, as there are tasks that can only be done on the server.See related link for some server side JavaScript options.


Why is Md5 insecure?

TechnicallyThe algorithm has a greater chance of hash collisions than other, similar hashing algorithms. This means it is less computationally expensive to crack than similar ones (such as SHA-1) and is thus less secure.For the Layman, briefly:MD5 is insecure because computer attackers have figured out a way to trick the MD5 security system into verifying that no tampering has occurred, when in fact the attacker has injected malicious code. It's like purchasing a lock for your bike that has a 5 buttons. Pressing one button will open the lock. The criminal can just try every possible combination in a short time, and thus the lock is considered insecure.Why is MD5 Insecure? Technical answer:Bob owns some web space on blue host, and he uploads an executable there that he intends other people to download and run so they can install his video game: angry_birds_installer.exe.Bob uploads angry_birds_installer.exe to blue host and has allowed other people to download it through the browser and install the game so they can install/play it. Bob generates profit by people buying the unlocked version of the game, therefore Bob wants to make absolutely sure that the attacker doesn't use the installer to install malware on the customers who install the game.Description of the security problem:Bob's executable is super-insecure now because suppose an attacker breaks in to his blue host account and somehow gets the ability to make a change to angry_birds_installer.exe. The attacker could drop in the new executable, and nobody is the wiser. Now, users who install angry_birds_installer.exe also install Conficker, a malicious bot-net on the customer's computer.Why would an attacker go to all this trouble?Answer: profit. The attacker wants to get in between Bob and his customers so he can install Conficker. With that, he can do the following things:Do Distributed Denial of Service attacks to take down the Internet in other countries by taking out the name servers and DNS servers.Launching trillions of spam emails.Acquire credit card numbers and incur charges via identity theft.Draining bank accounts of people who don't check their balance often.Many other brilliant illegal for-profit ideas to freeze your soul.Bob has a lot to be worried about on behalf of his customers who don't know the difference between browser security, antivirus software and a hole in the ground.Bob increases security with MD5 SumsBob has a plan, he will protect his executable by taking an MD5 check sum on angry_birds_installer.exe and store the result somewhere else (say on his go daddy web space) that has a different security system. The security conscious users who want to run angry_birds_installer.exe will also run an MD5 check sum against the executable they downloaded, and make sure that the check sums exactly match. If they do match, we can be relatively certain that the attacker has not modified the original angry_birds_installer.exe.Security problem solved?No. Mal-ware creators are clever, they were able to figure out that MD5 is insecure. They were able to find a way to break the algorithm for MD5 in order to run trillions of MD5 sums every second and find a "hash collision" between the original angry_birds_installer.exe and the modified: angry_birds_with_malware.exe. The attacker only has to compromise the blue host security and can drop-in the new executable that generates the SAME MD5 sum as the original, and the users who do check sums declare that the executable is safe, when it contains malware to install Conficker.MD5 sum is insecure because Bob thinks he is protecting the users from evil mal ware creators, but in reality, the mal ware creators have figured out a way to completely bypass the security model. MD5 Sums do not deliver any significant security enhancements as it was originally envisioned to be.


How secure is biometric?

I you are asking what the false-acceptance rates (FAR) are ... it depends on the type of biometric and how the sensitivity is set. The tighter you set the tolerances, the fewer false acceptances you get, but the more false rejections (FRR) you get. Typically: Fingerprint: 1% FAR at 10% FRR, 0.01% FAR at 20% FRR Hand-print: Better than fingerprints - somewhere in the neighborhood of Retina scans Iris: more intrusive but more accurate than retina scans Retina: better than fingerprints, less than Iris. Affected by health - prone to false rejections when health changes Voice: highly variable - affected by health (ever had a sore throat?) Facial recognition: 1% FAR at 10% FRR, 0.01% FAR at 30% FRR ... of course there are other biometrics that can be used, there are just some examples and YMMV. Usually Bio-metrics needs to be combined with another authentication method to achieve strong security - but with another method - even if the other method is a second bio-metric - it is very strong. If you are asking a bout how secure the database of bio-metric information is... that's just a general question of how secure the computer system is. Improperly secured it would be a tasty target for an attacker seeing PII on individuals.


Related questions

What is the receiver attacker?

A receiver attacker is a type of cybersecurity threat where an attacker intercepts or captures data transmitted between a sender and a receiver. This attack can lead to sensitive information being stolen or manipulated by the attacker. It is important to implement encryption and secure communication protocols to protect against receiver attacks.


What is it known as when an attacker causes users to not be able to access system applications or information?

Hacking


Why is the answerscom server broken by off site java script?

Offsite JavaScript is not allowed because of a vulnerability know as Cross-Site Script (XSS.) XSS happens when user input is improperly filtered, and <script> tags are allowed through to the user as source code. By inserting JavaScript into a site, an attacker can gain access to information given by that site's users. Furthermore, JavaScript can be used to either divert the user to a different page, or to convince the user that a file being downloaded is from a trusted source. See the related links for a complete explanation of XSS and how it is avoided by web programmers.


What is when an attacker tricks users into giving out information or performing a compromising action?

FraudDefraudingScamScammingDeceptive fraudDeceptive scammingTheft


Why do warriors wear masks?

typically its a way of dehumanizing the attacker so the victim sees no emotion no face thus a mental tactic


Are Social engineering attacks are only successful if the attacker is able to obtain all the information about your network?

yes


Is Social engineering attacks only successful if the attacker is able to obtain all the information about your network?

yes


Is Social engineering attacks are only successful if the attacker is able to obtain all the information about your network?

yes


When do you spray pepper spray?

You would typically use pepper spray when you feel like you are in danger from a person or animal. The pepper spray would deter the attacker and allow you the time to get away from them. Many pepper sprays have a dye in them - making it easier to identify the attacker.


What is the Tamil meaning for Attacker?

தாக்குபவன் (thaakkubavan) Attacker.


What is the phrase of hacking where the attacker creates a profile of the target and what else is it referred as?

The phrase is "social engineering" where the attacker manipulates people into providing confidential information or performing actions that compromise security. It is also referred to as "phishing" or "pretexting."


What are the two specialties that defined the DoD 8570.01 M?

By utilizing a port scanner, an attacker determined that ports 135 and 137 were listening on the target system. What does, if anything, this specific information tell the attacker?