answersLogoWhite

0


Best Answer

Foot-printing is the pre-hacking phase that could be accomplished without the attacker ever connecting to the target network.

User Avatar

Wiki User

9y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

12y ago

WikiAnswers does not provide information about illegal acts, such as hacking computers or networks.

This answer is:
User Avatar

User Avatar

Wiki User

13y ago

Foot-printing

This answer is:
User Avatar

User Avatar

Wiki User

13y ago

Foot-printing

This answer is:
User Avatar

User Avatar

Wiki User

13y ago

Foot Printing

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which pre-hacking phase could be accomplished without the attacker ever connecting to the target network?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Which Which pre-hacking phase could be accomplished without the attacker ever connecting to the target network?

Foot-printing is the pre-hacking phase that could be accomplished without the attacker ever connecting to the target network.


When connecting to a wireless network you are given the opportunity to enter the of the network?

name of the network


What is the main advantage of connecting computers into network?

The main advantage of connecting computers into network is to share and control all kind of resources of the network you have created for your users.


What is network communication?

communication network is a network of connecting the people to communicate with each other.


Can An attacker with wireless network card join an Active Directory domain?

its very odd chance the attacker can join only when he has in information about the network Ip subnet, The wireless password of the network the domain adminsitrator credentials hacking the wireless..in all very very remote chance but with Lan yes its possible


What is Packet Replication Attack?

A Packet Replication Attack is an Internal attack on the Networking layer of the OSI model, in which the attacker belongs to the same network the victims belong to and attacks the resources inside the network. This makes it harder to find out who the attacker is. When a Packet Replication Attack is performed the attacker replicates stale packets (packets that are delayed past a certain time) and sends them to a trigger network. This results in loss of bandwidth of the network, and this will eventually start consuming battery life of the nodes as well.


What is meant b networking?

It means connecting different computers and other equipment into a network, so that they can share data and resources.It means connecting different computers and other equipment into a network, so that they can share data and resources.It means connecting different computers and other equipment into a network, so that they can share data and resources.It means connecting different computers and other equipment into a network, so that they can share data and resources.


What is a cross-connecting?

Is a piece of circuit - switched network equipment used in telecommunications network.


Connecting one computer to another creates a?

network


What are other methods of connecting your computer to the internet?

using a dial-up network or a broadband network


Are Social engineering attacks are only successful if the attacker is able to obtain all the information about your network?

yes


Is Social engineering attacks only successful if the attacker is able to obtain all the information about your network?

yes