Answer Posted / chaitanya
Pharming: In this technique the attacker compromises the DNS ( Domain Name System) servers or on the user computer so that traffic is directed to a malicious site
Defacement: In this technique the attacker replaces the organization website with a different page. It contains the hackers name, images and may even include messages and background music
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
What is footprinting in ethical hacking? What is the techniques used for footprinting?
What laptops do hackers use?
What laptops hackers use?
What tools do real hackers use?
What are the 3 types of hackers?
How do hackers hack passwords?
Who is the most dangerous hacker?
Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?
What software do hackers use?
Who is the best hacker in the world?
What os do hackers use?