Types of Cyber Attacks

Compare and Contrast type of attacks

Social Engineering  

Phishing, Spear Phishing , Whaling, Vishing, Tailgating, Impersonation, Dumpster Diving, Shoulder Surfing

Application/Service Attacks

Buffer Overflow, Injection, Cross-Site Scripting, Cross-Site Forgery, Privilege Escalation, Impersonation/Masquerading, Replay, Driver Manipulation (Shimming, Refactoring)

Cryptographic Attacks

Birthday, Known plain text/cipher text, Rainbow Tables, Dictionary, Brute Force, Pass the hash

Hijacking and related attacks

Clickjacking, Session Hijacking, URL hijacking, Typo Squatting, MAC Spoofing, IP Spoofing

Network/Wireless Attacks

DoS, DDoS, Man in the middle, Amplification, DNS poisoning, Domain Hijacking, ARP Poisoning, Initialization Vector(IV), Evil Twin, Rogue AP, Jamming, Bluejacking, Bluesnarfing

Leave a comment

Your email address will not be published. Required fields are marked *