1/4
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Physical attack
a physical way to attack, and if someone has physical access to a server you have full control
Brute force
push through the obstruction, attackers will try everything
RFID Cloning
copying these badges or fobs from one card to another to get access
RFID
very commonly used for getting access to doors (ex. access badges, key fobs)
environmental attack
attack everything supporting the technology (ex. cut off power, HVAC controls, fire suppression)