Page 19 - CyberSecurityEssentialsEnglish
P. 19
In Zero-day (0-day) exploits, the attacker utilizes a new and recently announced vulnerability before a patch
is released as shown in figure 7.
Figure 7 Zero-day exploits
In password attacks, attackers attempt to access a password-secured file, folder or computer by trying brute
force algorithms (i.e. making several attempts) until they find the user's password as shown in figure 8.
Figure 8 Password attacks
In the Man-in-the-Middle attack,
the attacker intercepts a two-party communication, inserting himself in the middle as shown in figure 1.9.
The attacker can:
1. Intercepts the communication;
2. Impersonate each party participating in the communication; and
3. Steal sensitive data
17

