Ethical Hacking

12345678910
Across
  1. 3. Encryption method that uses the same key for encryption and decryption.
  2. 5. Malicious email technique used to trick users into revealing passwords.
  3. 8. Attack that injects malicious SQL queries into applications.
  4. 10. Manipulating people to reveal confidential information.
Down
  1. 1. Framework used to develop and test exploit code.
  2. 2. Tool used for network scanning and port discovery.
  3. 4. Legal document ethical hackers must obtain before testing.
  4. 6. Practice of legally testing systems to identify security vulnerabilities.
  5. 7. Type of attack that floods a system to deny access to legitimate users.
  6. 9. Tool used for capturing and analyzing network packets.