z-logo
open-access-imgOpen Access
A Bit of Hacking Techniques for Vulnerable Subdomain
Author(s) -
Maxwell Scale Uwadia Osagie,
Amenze Joy Osagie
Publication year - 2021
Publication title -
journal of advances in computing, communication and technology
Language(s) - English
Resource type - Journals
ISSN - 2795-2339
DOI - 10.37121/jaccit.v1.133
Subject(s) - hacker , computer science , vulnerability (computing) , computer security , phrase , key (lock) , simple (philosophy) , data access , database , artificial intelligence , philosophy , epistemology
Hacking as it is popularly called is an official phrase for unauthorised access to a network/data. However, there are different methods used in gaining access to a designated network; hence, this paper explained a few hacker’s intent using classified commercially available tools and techniques to expose the vulnerability of data and applications within networks. It also explained few simple ways of gaining access to a network without really having the key technical ability.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here