Across
- 4. DHCP WORKS ON TOP OF
- 7. CYBER SECURITY RESEARCHER
- 8. A FIREWALL
- 11. HIJACKING TOOLS
Down
- 1. IDENTIFYING AND MITIGATING SECURITY THREATS
- 2. TOOLS THAT CAN CAPTURE AND ANALYZE THE PACKETS
- 3. A WEB SECURITY VULNERABILITY
- 5. ENUMERATION process in security that uncover DNSrecord
- 6. HASHING ALGORITHM
- 9. FAMOUS TOOL IN PEN TESTING COMMUNITY
- 10. WEB APPLICATION DEVELOPED BY OWASP
