What is footprinting in ethical hacking? What is the techniques used for footprinting?
No Answer is Posted For this Question
Be the First to Post Answer
What are the 3 types of hackers?
Explain what is DHCP Rogue Server?
What os do hackers use?
Explain what is Cross-site scripting and what are the types of Cross site scripting?
List out some of the common tools used by Ethical hackers?
Explain what are the types of hacking stages?
Explain how you can stop your website getting hacked?
Mention what are the types of password cracking techniques?
Explain what is SQL injection?
What are the types of computer based social engineering attacks? Explain what is Phishing?
Explain what is CSRF (Cross Site Request Forgery)? How you can prevent this?
Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?