KarThi 777 on Clubhouse

Updated: Jan 3, 2024
KarThi 777 Clubhouse
215 Followers
1 Following
Jun 15, 2021 Registered
@karthi777777 Username

Bio

I AM WHITE HACK

1). Malware
Malware is a type of application that can perform a variety of malicious tasks. Some strains of malware are designed to create persistent access to a network, some are designed to spy on the user in order to obtain credentials or other valuable data, while some are simply designed to cause disruption.
Some forms of malware are designed to extort the victim in some way. Perhaps the most notable form of malware is Ransomware – a program designed to encrypt the victim’s files and then ask them to pay a ransom in order to get the decryption key.

2). Phishing
A Phishing attack is where the attacker tries to trick an unsuspecting victim into handing over valuable information, such as passwords, credit card details, intellectual property, and so on.
Phishing attacks often arrive in the form of an email pretending to be from a legitimate organization, such as your bank, the tax department, or some other trusted entity.
Phishing is probably the most common form of cyber-attack, largely because it is easy to carry-out, and surprisingly effective.

3). Man-in-the-middle attack (MITM)
A man-in-the-middle attack (MITM) is where an attacker intercepts the communication between two parties in an attempt to spy on the victims, steal personal information or credentials, or perhaps alter the conversation in some way.
MITM attacks are less common these days as most email and chat systems use end-to-end encryption which prevents third parties from tampering with the data that is transmitted across the network, regardless of whether the network is secure or not.

4). Distributed Denial-of-Service (DDoS) attack
A DDoS attack is where an attacker essentially floods a target server with traffic in an attempt to disrupt, and perhaps even bring down the target. However, unlike traditional denial-of-service attacks, which most sophisticated firewalls can detect and respond to, a DDoS attack is able to leverage multiple compromised devices to bombard the target with traffic.

5). SQL injection
SQL injection is a type of attack which is specific to SQL databases. SQL databases uses SQL statements to query the data, and these statements are typically executed via a HTML form on a webpage. If the database permissions have not been set properly, the attacker may be able to exploit the HTML form to execute queries that will create, read, modify or delete the data stored in the database.

Invited by: Vino Liya

Last 10 Records

if the data has not been changed, no new rows will appear.

Day Followers Gain % Gain
January 03, 2024 215 -1 -0.5%
October 03, 2022 216 -2 -1.0%
August 12, 2022 218 -2 -1.0%
July 06, 2022 220 +1 +0.5%
May 30, 2022 219 -6 -2.7%
April 22, 2022 225 -3 -1.4%
March 14, 2022 228 -4 -1.8%
December 09, 2021 232 -1 -0.5%
November 01, 2021 233 -3 -1.3%
September 25, 2021 236 +180 +321.5%

Charts

Member of

More Clubhouse users