ETHICAL HACKING

1234567891011
Across
  1. 4. DHCP WORKS ON TOP OF
  2. 7. CYBER SECURITY RESEARCHER
  3. 8. A FIREWALL
  4. 11. HIJACKING TOOLS
Down
  1. 1. IDENTIFYING AND MITIGATING SECURITY THREATS
  2. 2. TOOLS THAT CAN CAPTURE AND ANALYZE THE PACKETS
  3. 3. A WEB SECURITY VULNERABILITY
  4. 5. ENUMERATION process in security that uncover DNSrecord
  5. 6. HASHING ALGORITHM
  6. 9. FAMOUS TOOL IN PEN TESTING COMMUNITY
  7. 10. WEB APPLICATION DEVELOPED BY OWASP