Capture.PNG
Document Details
Uploaded by jlopez59#
Tags
Related
- Certified Cybersecurity Technician Information Security Attacks Exam 212-82 PDF
- NPTEL Online Certification Courses: Ethical Hacking Lecture Notes PDF
- ECCouncil Certified Ethical Hacker Exam (CEHv12) 312-50v12 PDF
- Ethical Hacking Past Paper PDF Week 1 & 2
- Computer Network Security and Attacks on Wireless Sensor Network, Hacking Issues PDF
- Network Basics for Hackers PDF
Full Transcript
# What Are We Up Against? (5 of 6) - Zombies and Botnets - A **zombie** is a computer that has been hacked - Hacker uses the computer to run repetitive software in the background - A **botnet** is an entire network of zombies - Dictionary Attack - Used to crack a long password b...
# What Are We Up Against? (5 of 6) - Zombies and Botnets - A **zombie** is a computer that has been hacked - Hacker uses the computer to run repetitive software in the background - A **botnet** is an entire network of zombies - Dictionary Attack - Used to crack a long password by trying words in a dictionary - Rainbow Tables - Contains a long list of plaintext passwords and the password hash list (after it is encrypted)