The Certified Cyber Security Expert (CCSE) & Certifid Cyber Security Professional (CCSP) program is a trusted and respected ethical hacking training Program that any information security professional will need. Hackingmantra is a pilgrim in providing network and CyberSecurity solutions.



WhatsApp Image 2019-07-23 at 2.05.08 PM

1) Botnet – A botnet (robot and network) is a network of devices infected by an attacker and then used together to perform tasks such as DDoS attacks (see below), mining Bitcoin, and spreading spam emails.Any device those which are connected to the internet, including home routers, can be infected and pulled into a botnet without owner ever noticing.

2) Data breach – A data breach happens when a company’s network is attacked and valuable data is stolen – usually personal information, log-in credentials, credit card details, and Social Security numbers. The stolen data can then be abused in my ways: held for ransom, sold on the dark net, and used to make purchases. Often hackers try to crack email passwords, then test those log-in details on other popular sites, since many people use the same credentials for multiple accounts.

3) DDoS attack – Attackers use DDoS (Distributed Denial of Service) attacks to render a network unavailable. The target suffers a severely hamper bandwidth, and legitimate connections become impossible. These attacks are typically carried out by botnets

4) DNS attack – A “domain name server” attack is a type of DDoS attack that uses specific kinds of query protocols and available hardware to overwhelm a system with incoming queries. A hacker can be able to manipulate publicly accessible domain names and flood the target with large volumes of data packets or requests.

DomainNameSever hijacking involves redirecting users to malicious sites through the use of arogue DNS server. For instance, you’d expect “” to take you to Google’s IP address. Using a DNS hijack, however, cybercriminals can translate “” to their own IP address, redirecting you to a malicious site where they can collect your information or have you download malware. In an attempt to get you to click on a link, DNS hijacks can also deliver altered search results.

5) Mobile banking Trojans – It looks like your trusted banking app, but that’s just an overlay. Covered, a mobile banking Trojan tricks you into entering financial credentials and personal information. It can also gain administrative rights to intercept SMS messages, making it possible to record two-factor authentication codes as well.

6) Open Wi-Fi – Encrypted connections protect you. Public Wi-Fi networks are unencrypted, which is why they’re risky. An attacker can be able to create a fake hotspot and trick yourdevice into joining it automatically.

7) When you use open Wi-Fi without the protection of a VPN (see tips below), any one on that network can see the sites you visit, your login passwords, your financial and personal data, and more. Hackers often name their phony Wi-Fi networks after popular spots (like “Starbucks”), knowing that most devices automatically rejoin hotspots they’ve used in the past. An atacker can even redirect your unencrypted traffic, sending you to malicious sites.

8) Phishing – Phishing is an attack Used by cybercriminals to trick you into giving up sensitive information, phishing scams pose as emails from an organization or person you know. There is usually a link or attachment included, which it urges you to click so that you’ll unwittingly download malware to your system. Sometimes phishing attack look indistinguishable from the sites they’re imitating, and they attempt to trick you into entering your password.

9) Ransomware – Ransomware is a kind malware that takes hold of your system and encrypts it, sometimes attacking individual files. Attempting to access the encrypted files triggers the ransom note, which claims you are locked out until you make a payment. The messages sometimes pretend to be from an official government agency accusing you of committing a cybercrime, which scares many into paying the ransom.Payment is often demanded in Bitcoin.