Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
s
- Sensor network hackingDescription: Sensor network hacking refers to the practice of exploiting vulnerabilities in sensor networks, which are systems composed of(...) Read more
i
- Information systems hackingDescription: Ethical hacking refers to the act of exploiting vulnerabilities in information systems with the purpose of identifying and(...) Read more
n
- Network device hackingDescription: Network device hacking refers to the practice of exploiting vulnerabilities in devices that are part of a network, such as routers,(...) Read more
h
- Hacking of management systemsDescription: Hacking of management systems refers to the act of exploiting vulnerabilities in platforms that manage and control various(...) Read more
- HTTP Flood Description: HTTP flooding is a type of distributed denial-of-service (DDoS) attack that aims to overwhelm a web server with an excessive volume(...) Read more
- Header Injection Description: Header injection is a security vulnerability in web applications that allows an attacker to manipulate the HTTP headers of(...) Read more
- HTTP Methods Description: HTTP methods are a set of verbs that indicate the action to be performed on a resource on the web. Each method has a specific(...) Read more
- Hidden Fields Description: Hidden fields are HTML elements that are not visible to users in a web page's interface but can be manipulated by attackers. These(...) Read more
- HTTP Interception Description: HTTP interception refers to the act of intercepting requests and responses sent over the HTTP protocol, which is fundamental for(...) Read more
- Hybrid Attack Description: A hybrid attack is a cyberattack technique that combines multiple methods and approaches to exploit vulnerabilities in computer(...) Read more
- Hacking Methodology Description: The hacking methodology refers to a systematic approach to conducting penetration testing and evaluating the security of computer(...) Read more
- Host Enumeration Description: Host enumeration is the process of identifying active devices on a network. This process is fundamental in information security(...) Read more
- Host Intrusion Prevention System Description: A Host Intrusion Prevention System (HIPS) is a security solution designed to monitor and control the activities of a host, such as(...) Read more
- Honeypot Analysis Description: Honeypot analysis is the process of examining data collected from systems designed to attract and deceive cyber attackers. These(...) Read more
- HTTP Request Smuggling Description: HTTP request smuggling is a type of attack that exploits discrepancies in how different servers handle HTTP requests. This(...) Read more