answersLogoWhite

0

Foot-printing is the pre-hacking phase that could be accomplished without the attacker ever connecting to the target network.

User Avatar

Wiki User

10y ago

What else can I help you with?

Related Questions

Which Which pre-hacking phase could be accomplished without the attacker ever connecting to the target network?

Foot-printing is the pre-hacking phase that could be accomplished without the attacker ever connecting to the target network.


When connecting to a wireless network you are given the opportunity to enter the of the network?

name of the network


What is the main advantage of connecting computers into network?

The main advantage of connecting computers into network is to share and control all kind of resources of the network you have created for your users.


What is network communication?

communication network is a network of connecting the people to communicate with each other.


Can An attacker with wireless network card join an Active Directory domain?

its very odd chance the attacker can join only when he has in information about the network Ip subnet, The wireless password of the network the domain adminsitrator credentials hacking the wireless..in all very very remote chance but with Lan yes its possible


What is Packet Replication Attack?

A Packet Replication Attack is an Internal attack on the Networking layer of the OSI model, in which the attacker belongs to the same network the victims belong to and attacks the resources inside the network. This makes it harder to find out who the attacker is. When a Packet Replication Attack is performed the attacker replicates stale packets (packets that are delayed past a certain time) and sends them to a trigger network. This results in loss of bandwidth of the network, and this will eventually start consuming battery life of the nodes as well.


What is a cross-connecting?

Is a piece of circuit - switched network equipment used in telecommunications network.


What is meant b networking?

It means connecting different computers and other equipment into a network, so that they can share data and resources.It means connecting different computers and other equipment into a network, so that they can share data and resources.It means connecting different computers and other equipment into a network, so that they can share data and resources.It means connecting different computers and other equipment into a network, so that they can share data and resources.


Connecting one computer to another creates a?

network


Is Social engineering attacks only successful if the attacker is able to obtain all the information about your network?

yes


Are Social engineering attacks are only successful if the attacker is able to obtain all the information about your network?

yes


Is Social engineering attacks are only successful if the attacker is able to obtain all the information about your network?

yes