Hoe kunnen wij helpen?
-
Woordenboek
- API
- Authentication Bypass
- Blind SQL injection
- Broken Access Control
- Broken Authentication
- Brute-Force Attack
- Caching
- Captcha
- Certificate Authority (CA)
- Clickjacking
- Client-Side
- Cross-Site Request Forgery (CSRF)
- Cross-Site Scripting (XSS)
- Dark Web
- Denial of Service (DoS)
- Distributed Denial of Service (DDoS)
- DNS
- DNS Amplification Attack
- Domain Administrator (DA)
- Encryption
- End of Life (EOL)
- Ethical Hacking
- Expired Certificate
- HTTP
- HTTPS
- Incident Response (IR)
- Injection
- Insufficient Logging & Monitoring
- Internal IP Address
- IoT
- IP Address
- Man in the Middle Attack (MiTM)
- Open Source Intelligence (OSINT)
- Patching
- Pentest
- Phishing
- Ransomware
- Red Team Test
- Security Misconfiguration
- Server-Side
- Session Expiration / Session Timeout
- Session Hijacking
- Session Token
- Smishing
- SMTP
- Spoof
- SQL Injection (SQLi)
- VPN
- Vulnerable and Outdated Components
- XML External Entities (XXE)
- Show remaining articles (35) Collapse articles
< Alle onderwerpen
Printen
Brute-Force Attack
Brute-Force Attack is an attack where many requests are sent to a server with the intent of guessing a value, often a password, by sending a large number of possible candidates. A common example is an attack on a login page where the list of requests contains every permutation of letters and numbers within a certain length string.
Inhoudsopgave