Across
- 1. Attack using precompiled lists of common passwords.
- 3. Searching for insecure wireless networks to exploit.
- 6. Small piece of code used to exploit a vulnerability.
- 10. Technique aimed at disturbing or halting services.
- 13. Memory structure targeted in buffer overflow attacks.
- 14. Process of gathering information before an attack.
Down
- 2. Error caused when data exceeds memory storage limits.
- 4. Technique of inserting malicious code into input fields.
- 5. Cross-site scripting that injects scripts into web pages.
- 7. Code or tool designed to abuse vulnerabilities.
- 8. Method of guessing passwords by trying all possibilities.
- 9. Attack that makes a system unavailable to users.
- 11. Condition where timing flaws lead to security gaps.
- 12. Engineering attack that manipulates human behavior.
- 15. Database query language often exploited for injection attacks.
