3.7 Understand methods of cryptanalytic attacks
- 3.7.1 Brute-force
- 3.7.2 Ciphertext only
- 3.7.3 Known Plaintext
- 3.7.4 Frequency Analysis
- 3.7.5 Chosen Ciphertext
- 3.7.6 Implementation Attacks
- 3.7.7 Side-channel Attack (SCA)
- 3.7.8 Fault injection
- 3.7.9 Timing Attacks
- 3.7.10 Man-in-the-Middle (MITM)
- 3.7.11 Pass the hash
- 3.7.12 Kerberos Exploitation
- 3.7.13 Ransomware
- 3.7.14 Other Key Attacks