Across
- 3. Searching for insecure wireless networks to exploit.
- 4. Small piece of code used to exploit a vulnerability.
- 7. Memory structure targeted in buffer overflow attacks.
- 8. Technique aimed at disturbing or halting services.
- 10. Cross-site scripting that injects scripts into web pages.
- 12. Process of gathering information before an attack.
- 13. Method of guessing passwords by trying all possibilities.
- 14. Engineering attack that manipulates human behavior.
Down
- 1. Condition where timing flaws lead to security gaps.
- 2. Code or tool designed to abuse vulnerabilities.
- 5. Attack using precompiled lists of common passwords.
- 6. Error caused when data exceeds memory storage limits.
- 8. Attack that makes a system unavailable to users.
- 9. Technique of inserting malicious code into input fields.
- 11. Database query language often exploited for injection attacks.
