Type of Attack |
What it means |
Free Version |
Full Version
|
ClickJacking
|
Hiding a portion of a legitimate web site in a transparent or invisible layer under a mock button or link. Innocent users think they are pressing the link or button when in fact they are performing unintended actions on the other page.
For a video explaining attack press here. |
✓ |
✓ |
Key Logger
|
A key logger is a malware used to steal passwords by recording the user key strokes on the keyboard.
For a video explaining attack press here. |
✓ |
✓ |
Buffer Overflow
|
A buffer overflow occurs when a program or process tries to store more data in a buffer than it was intended to hold.
In buffer overflow attacks, the extra data may contain codes designed to compromise the machine, steal a user’s files, execute a code remotely, or disclose confidential information. |
✓ |
✓ |
Trojan Horses
|
Trojan horses are a type of malware that is used to grant hackers access to your computer for stealing files and personal information, watching your screen and more. |
(1) |
✓ |
Phishing &
Pharming
|
Malicious impersonation of legitimate websites such as banks, PayPal etc.
in order to obtain credentials and other private information from an unsuspecting surfer.
For a video explaining attack press here. |
(2) |
✓ |
Session riding
(CSRF)
|
A malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts, performing unwanted transactions.
For a video explaining attack press here.
|
✗ |
✓ |
DNS rebinding
|
By changing DNS configuration in local network equipment, an attacker enables further attacks such as phishing & pharming. |
✗ |
✓ |
Cross-Site
Scripting (XSS)
|
Using legitimate web application vulnerabilities in order to implant malicious code in web pages, causing innocent surfers to send sensitive information back to malicious servers. |
✗ |
✓ |
File Stealing
|
By using Internet Explorer’s ability to access local files, an attacker can read and send out the contents of potentially sensitive files from local computer and network shares. |
✗ |
✓ |
|
|
Download free version
|
Download trial |