Hacking types/attacks, Everything You Need To Know
What hacking types-attacks are commonly used?
Image by Kevin Horvat
Estimated Reading Time 2 min
1.Brute-Force Attacks :
Brute Force Attacks Are A Type Of Attack Where The Attacker Tries To Gain Access By Automating Hundreds Of Possible Passwords And Combinations.
2.Backdoors :
Backdoors are implements to Surreptitiously bypass authentication or security to gain unauthorised control
3. D.D.o.S :
In A D.D.o.S or Denial-of-Service (DDoS) Attack, The Attacker/Attackers send malicious traffic To temporarily overload and disrupt A System Or Machine Or Network.
4.Phishing :
Image By Pascal Müller
Phishing is a well-known method to acquire case sensitive personal information or credential for malicious authentication, A Attacker Typically Sends A Well Crafted Email/Sms (Smishing) And Pretends To Be A Popular-Trusted Company To Trick A Person Into Inserting Their Personal Information And Credential.
Image by elconomeno
5.Social engineering:
Social engineering is a method where People are manipulated into performing actions,giving out sensitive information, Impersonation comportment can have a sizably voluminous impact on This Type Of Attack.(e.g Phishing)
Image By Markus Spiske6.Reverse engineering:
Reverse engineering is a method where The Attacker Or Hacker Decompiles A Program Integrates Malevolent Harmful Code And Re-builds The Program
Image By Franck
7.Wpa-Wpa2 Attacks :
WPA-WPA2 is a way to secure WiFi Systems, However Wpa2 Is Vulnerable to Different Attacks Such As KRACK, Misusing GTK, packet spoofing and decryption etc.
8.KeyLogging:
Keylogging is a way of recording whats being written, A Attacker mainly captures what the Person Is Writing.
9.SQL Injection:
In This Type Of Attack The Attacker Attacks Or Compromises-Removes Data Form Vulnerable SQL Databases.
Image by Elti Meshau
10.Man In The Middle :
In This Type Of Attack The Attacker Impersonates As Another Person Between Two Person's.Such As "A" Wants To Talk To "B" But "C" Uses MITM And Joins The Conversation Secretly, As "C" Can Spy On The Conversation Between "A" And "B", "C" Can Also Send Messages Impersonating As Someone.
Comments