Essential InfoSec FAQ: From White‑Hat Basics to Advanced Attack Techniques

This comprehensive FAQ explains key information‑security concepts, covering white‑hat hacking, IP vs MAC addresses, common penetration‑testing tools, hacker types, footprinting methods, brute‑force, DoS, SQL injection, sniffing, ARP spoofing, MAC flooding, rogue DHCP, XSS, Burp Suite, pharming, defacement, website protection, keyloggers, enumeration, NTP, MIB, password‑cracking techniques, attack stages, and CSRF mitigation.

MaGe Linux Operations
MaGe Linux Operations
MaGe Linux Operations
Essential InfoSec FAQ: From White‑Hat Basics to Advanced Attack Techniques

What is a white‑hat hacker?

A white‑hat hacker is someone authorized by the system owner to attack the system, discover weaknesses, and fix bugs.

Difference between IP address and MAC address

IP address is assigned to each device to locate it on a network. MAC address is a unique serial number assigned to each network interface.

Common tools used by white‑hat hackers

Kali

Metasploit

Wireshark

Nmap

John the Ripper

Maltego

Types of hackers

Grey‑hat / cyber‑warrior

Black‑hat

White‑hat

Certified white‑hat

Red‑hat

Footprinting and its techniques

Footprinting is gathering information about a target network before an attack. Techniques include open‑source footprinting, network enumeration, scanning, and stack fingerprinting.

Brute‑force attacks

Brute‑force attacks try many passwords to gain access; tools such as Hydra are commonly used.

Denial‑of‑Service (DoS) attacks

DoS floods a network with useless traffic. Common forms include buffer‑overflow attacks, SYN flood, Teardrop, Smurf, and viruses.

SQL injection

SQL injection inserts malicious SQL commands into a web application’s input to manipulate the database and steal data.

Network sniffing

Sniffing monitors data flowing through a network, useful for troubleshooting or illicit data capture.

ARP spoofing

ARP spoofing sends forged ARP replies to alter a target’s MAC‑IP mapping, enabling man‑in‑the‑middle attacks.

Preventing ARP poisoning

Packet filtering

Avoiding trust relationships

Using ARP‑spoof detection software

Encrypting traffic with TLS/SSH/HTTPS

MAC flooding

MAC flooding overwhelms a switch with many frames, causing it to broadcast all traffic and potentially expose sensitive data.

Rogue DHCP server

A rogue DHCP server operates without admin control, assigning IP configuration to clients and can sniff traffic.

Cross‑site scripting (XSS)

XSS injects malicious code into trusted web pages. Types: non‑persistent (reflected), stored, and DOM‑based.

Burp Suite overview

Burp Suite is an integrated platform for web‑application security testing, including tools such as Proxy, Spider, Scanner, Intruder, Repeater, Decoder, Comparer, Sequencer.

Pharming and defacement

Pharming redirects traffic to malicious sites by compromising DNS. Defacement replaces a website’s content with the attacker’s message.

How to protect a website from hacking

Sanitize and validate user input

Use firewalls to block malicious traffic

Encrypt cookies and bind them to client IP

Validate and clean HTTP headers

Keylogger trojan

A keylogger records keystrokes and sends them to a remote attacker, capturing credentials.

Enumeration

Enumeration extracts system information such as machine names, users, network resources, shares, and services.

Network Time Protocol (NTP)

NTP synchronizes clocks of networked computers via UDP port 123, maintaining accuracy within 10 ms.

Management Information Base (MIB)

MIB is a virtual database that defines network objects managed via SNMP, organized hierarchically with OIDs.

Password cracking methods

Brute‑force

Hybrid attacks

Syllable attacks

Rule‑based attacks

Stages of a hacking attack

Gaining access

Privilege escalation

Application hiding

Covering tracks

Cross‑Site Request Forgery (CSRF)

CSRF tricks a logged‑in user’s browser into sending unwanted requests; mitigation includes adding unpredictable tokens tied to the user session.

InfoSec illustration
InfoSec illustration
Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

information securitynetwork securitycybersecuritypenetration testingvulnerabilitieshacking
MaGe Linux Operations
Written by

MaGe Linux Operations

Founded in 2009, MaGe Education is a top Chinese high‑end IT training brand. Its graduates earn 12K+ RMB salaries, and the school has trained tens of thousands of students. It offers high‑pay courses in Linux cloud operations, Python full‑stack, automation, data analysis, AI, and Go high‑concurrency architecture. Thanks to quality courses and a solid reputation, it has talent partnerships with numerous internet firms.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.