×
Home Discussions Write at Opengenus IQ
×
  • Join our Internship πŸŽ“
  • #7daysOfCode
  • C Interview questions
  • Linux πŸ’½
  • πŸ”Š Data Structures
  • Graph Algorithms
  • Dynamic Programming πŸ’‘
  • Greedy Algo πŸ“”
  • Algo Book 🧠
  • String Algo 🧬
  • Home

Drive By Login Attack

cyber security


cyber security social engineering drive by login attack phishing attack

Sign up for FREE 1 month of Kindle and read all our books for free.

Get FREE domain for 1st year and build your brand new site

Reading time: 10 minutes

drive by login attack

Drive-By Login is a form of phishing attack in which a hacker sets up the malicious code on the victim's favorite website.

Procedure For The Attack

  1. In this attack, the hacker first tries to know the victim website through various methods of social engineering. After this, the hacker then tries to search out for the bugs in the website.
  2. As soon as he finds out the bugs in the website the hacker then do the drive-by malware attack to target the victim. After this, the hacker then just wait for some period of time.
  3. As soon as the victim visits that website the malicious code then executes and validates the victim's machine for the specific email or IP address. After matching the specific email or IP Address the malware is specifically delivered into the victim’s system and not to the other visitors of that website.

Mitigation For The Attack

To stay safe from this attack:

  • Keep the browsers updated from time to time
  • Use anti-phishing tools
  • Apply the anti-spam policy in the inbox to filter out the spam emails
  • Never click on any suspicious link in an email or on any website.

MCQ

Question 1

Drive By Login Is a Type Of Which Attack?

Phishing Attack
Spoofing Attack
DDoS Attack
MitM Attack

Question 2

What can be done to prevent this type of attack?

Never Click On Suspicious Link
Use Multi-Factor Authentication
Use OTP
Use Updated firewall

Sanyam J

Read more posts by this author.

Read More

Vote for Sanyam J for Top Writers 2021:

OpenGenus Foundation OpenGenus Foundation

Tags

cyber security social engineering drive by login attack phishing attack

— OpenGenus IQ: Learn Computer Science —

cyber security

  • What is Content Security Policy (CSP)?
  • SamSam Ransomware: made $850K by attacking government organizations
  • Jigsaw Ransomware: Pay $150 in bitcoin with live support or get files deleted
See all 24 posts β†’
Data Structures

Segment Tree

A segment tree is a divide and conquer based data structure used to store information about intervals of some linear data structure. It is a height-balanced binary tree where every node corresponds to an interval of the array. It allows processing interval or range queries in logarithmic time

Yash Aggarwal Yash Aggarwal
Software Engineering

Check memory usage in Linux

Five tools to check memory usage on Linux are free, /proc/meminfo, vmstat, top and dmidecode. The difference between clock speed and memory access is increasing day by day. To keep our machines healthy, we want to check the memory usage of several processes and in Linux, we have five tools to do so.

OpenGenus Foundation OpenGenus Foundation
-->
OpenGenus IQ: Learn Computer Science icon OpenGenus IQ: Learn Computer Science
—
Drive By Login Attack
Share this
×

Visit our discussion forum to ask any question and join our community

View Forum
OpenGenus IQ © 2021 All rights reserved β„’ [email: team@opengenus.org]
Top Posts LinkedIn Twitter