Refers to an attack collecting multiple pieces of non-sensitive information and putting them together to learn sensitive information. Example: Reconnaissance attacks, in which you learn the IPs, open ports, running services, operating systems, etc.
Birthday attacks focus on finding collisions. Birthday refers to the birthday paradox:
If you have 377 people in a room you have a chance of 100% of having a birthday collision
If you have only 23 people, you still have a chance of 50%…
Use Hash Algorithms that are computational collision-free like SHA-3. And watch out for algorithms such as MD5, which has collisions.
An issue you occur when trying to find a password, is you have to guess it, hash it and can only then compare it to the saved password hash. A rainbow table has a large database of precomputed hashes, which speeds up this process. A password cracker then compares all hashes from the rainbow table to hashes from stolen password databases.
Is when someone tracks packages sent over a network and tries to get information or data through this. (Using a packet tracer)
Techniques to prevent this:
Spoofing means to pretend to be someone or something.
An IP spoofing attack, means using another IP to pretend to be someone.
You can also spoof emails, phone numbers, etc.