Across
- 2. intercepting two way communications between 2 parties
- 3. exploiting weaknesses in ARP
- 7. translates domain names into ip addresses
- 11. capturing information from communications you shouldn't
- 12. tools used to scan for vulnerabilities and open ports
Down
- 1. cyber attack that first scans for vulnerabilities in a system
- 4. exploits a vulnerability before vendor is aware of it
- 5. identifies hosts in a network
- 6. attack by stealing a session key or cookie
- 8. posing as something you're not
- 9. group of infected computers that work together without the owners knowledge
- 10. denial of service attack
