Hacking types/attacks, Everything You Need To Know

What hacking types-attacks are commonly used?

Image by Kevin Horvat  

Estimated Reading Time 2 min

1.Brute-Force Attacks :

Brute Force Attacks Are A Type Of Attack Where The Attacker Tries To Gain Access By Automating  Hundreds Of Possible Passwords And Combinations. 

2.Backdoors :

Backdoors are implements to Surreptitiously bypass authentication or security to gain unauthorised control
 

Image By Bermix Studio 



3. D.D.o.S :

In A D.D.o.S  or  Denial-of-Service (DDoS) Attack, The Attacker/Attackers send malicious traffic  To temporarily overload and disrupt A System Or Machine Or Network.

4.Phishing :

Image By Pascal Müller 


Phishing is a well-known method to acquire case sensitive personal information or credential for malicious authentication, A Attacker Typically Sends A Well Crafted Email/Sms (Smishing) And Pretends To Be A Popular-Trusted Company To Trick A Person Into Inserting Their Personal Information And Credential.
Image by elconomeno 



5.Social engineering:

Social engineering is a method where People are manipulated into performing actions,giving out sensitive information, Impersonation comportment can have a sizably voluminous impact on This Type Of Attack.(e.g Phishing) 

Image By Markus Spiske
6.Reverse engineering:

Reverse engineering is a method where The Attacker Or Hacker Decompiles A Program Integrates Malevolent Harmful Code And Re-builds The Program


Image By Franck 
7.Wpa-Wpa2 Attacks :

WPA-WPA2 is a way to secure WiFi Systems, However Wpa2 Is Vulnerable to  Different Attacks Such As KRACK, Misusing GTK, packet spoofing and decryption etc. 


8.KeyLogging:

Keylogging is a way of recording whats being written, A Attacker mainly captures what the Person Is Writing. 

9.SQL Injection:

In This Type Of Attack The Attacker Attacks Or Compromises-Removes Data Form Vulnerable SQL Databases. 

Image by Elti Meshau 



10.Man In The Middle :

In This Type Of Attack The Attacker Impersonates As Another Person Between Two Person's.Such As "A" Wants To Talk To "B" But "C" Uses MITM And Joins The Conversation Secretly, As "C" Can Spy On The Conversation Between "A" And "B", "C" Can Also Send Messages Impersonating As Someone.




-Thanks For Reading - 

Comments

Anonymous said…
This comment has been removed by a blog administrator.