the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
an attack that forces authenticated users to submit a request to a Web application against which they are currently authenticated.
is a giant list of these hashes, but they’re created ahead of time for many possible passwords. Adding random data (a "salt") to each password before hashing makes rainbow tables ineffective because each password gets a unique hash.
RAT
designed to allow an attacker to remotely control a computer similar to how the Remote Desktop Protocol (RDP) and TeamViewer can be used for remote access or system administration.