HACKING ATTACKS

 Here’s an extensive list of hacking attacks, cyberattacks, and cybersecurity threats organized by their type:

1. Malware (Malicious Software) Attacks

  • Virus
  • Worm
  • Trojan Horse
  • Ransomware
  • Spyware
  • Adware
  • Rootkit
  • Backdoor
  • Botnets
  • Keylogger
  • Cryptojacking
  • Zero-day malware
  • Malvertising
  • Fileless malware
  • Polymorphic malware
  • Logic bombs

2. Phishing Attacks

  • Spear Phishing
  • Whaling
  • Clone Phishing
  • Voice Phishing (Vishing)
  • SMS Phishing (Smishing)
  • Business Email Compromise (BEC)
  • CEO Fraud
  • Angler Phishing (via social media)
  • Pharming (DNS poisoning)
  • Watering Hole Attack

3. Password Attacks

  • Brute Force Attack
  • Dictionary Attack
  • Credential Stuffing
  • Password Spraying
  • Rainbow Table Attack
  • Keylogger Attack
  • Shoulder Surfing
  • Credential Cracking

4. Denial of Service (DoS) & Distributed Denial of Service (DDoS) Attacks

  • Volumetric DDoS
  • SYN Flood Attack
  • UDP Flood Attack
  • Ping of Death
  • Smurf Attack
  • HTTP Flood
  • DNS Amplification Attack
  • ICMP Flood Attack
  • Slowloris Attack
  • Tear Drop Attack
  • Fraggle Attack

5. Man-in-the-Middle (MITM) Attacks

  • Session Hijacking
  • SSL Hijacking
  • Wi-Fi Eavesdropping
  • Email Hijacking
  • IP Spoofing
  • DNS Spoofing
  • HTTPS Spoofing
  • ARP Spoofing
  • Replay Attack
  • On-path Attack

6. Social Engineering Attacks

  • Baiting
  • Pretexting
  • Quid Pro Quo
  • Tailgating
  • Piggybacking
  • Shoulder Surfing
  • Dumpster Diving
  • Impersonation
  • Honey Trap

7. SQL Injection (SQLi) Attacks

  • Union-based SQL Injection
  • Error-based SQL Injection
  • Blind SQL Injection
  • Time-based Blind SQL Injection
  • Boolean-based Blind SQL Injection

8. Cross-Site Scripting (XSS) Attacks

  • Stored XSS (Persistent)
  • Reflected XSS (Non-Persistent)
  • DOM-based XSS
  • Self XSS

9. Cross-Site Request Forgery (CSRF) Attacks

  • Stored CSRF
  • Reflected CSRF
  • Login CSRF

10. DNS Attacks

  • DNS Spoofing/Poisoning
  • DNS Tunneling
  • DNS Hijacking
  • Domain Hijacking
  • Cache Poisoning
  • NXDOMAIN Attack
  • Random Subdomain Attack
  • Phantom Domain Attack

11. Insider Threats

  • Malicious Insider (Sabotage)
  • Negligent Insider
  • Compromised Insider
  • Third-Party Insider

12. Advanced Persistent Threats (APTs)

  • APT1 (China-based group)
  • APT28 (Fancy Bear)
  • APT29 (Cozy Bear)
  • Lazarus Group (North Korea)
  • APT33 (Iranian hackers)
  • Equation Group
  • Operation Shady RAT

13. Cryptographic Attacks

  • Birthday Attack
  • Man-in-the-Middle Attack
  • Padding Oracle Attack
  • Chosen Ciphertext Attack
  • Chosen Plaintext Attack
  • Ciphertext-only Attack
  • Replay Attack
  • Side-channel Attack
  • Weak-key Attack

14. Network and Protocol Attacks

  • ARP Spoofing
  • MAC Flooding
  • ICMP Redirect Attack
  • Routing Table Poisoning
  • Session Hijacking
  • SYN Flooding
  • DNS Cache Poisoning
  • Evil Twin Attack
  • SSL/TLS Renegotiation Attack
  • SSL Strip Attack
  • IP Spoofing

15. Ransomware Attacks

  • CryptoLocker
  • WannaCry
  • Petya/NotPetya
  • Ryuk
  • Maze
  • REvil/Sodinokibi
  • DarkSide
  • LockBit
  • Crysis
  • TeslaCrypt

16. Exploit and Vulnerability Attacks

  • Zero-Day Exploits
  • Buffer Overflow Attack
  • Heap Spray Attack
  • Return-Oriented Programming (ROP) Attack
  • Shellshock
  • EternalBlue
  • Spectre and Meltdown
  • Rowhammer
  • Privilege Escalation
  • Directory Traversal

17. Web Application Attacks

  • Local File Inclusion (LFI)
  • Remote File Inclusion (RFI)
  • Insecure Deserialization
  • XML External Entity (XXE)
  • Broken Authentication
  • Server-Side Request Forgery (SSRF)

18. Wireless Attacks

  • Evil Twin Attack
  • Rogue Access Point
  • WEP/WPA Cracking
  • Bluetooth Hacking
  • Bluejacking
  • Bluesnarfing
  • Bluebugging
  • KRACK (Key Reinstallation Attack)

19. IoT (Internet of Things) Attacks

  • Mirai Botnet
  • IoT Device Hijacking
  • IoT Ransomware
  • BrickerBot (Permanent Denial-of-Service)
  • Jamming Attacks

20. Physical and Hardware Attacks

  • USB Drop Attack (BadUSB)
  • Hardware Keyloggers
  • Evil Maid Attack
  • Cold Boot Attack
  • DMA (Direct Memory Access) Attack
  • TEMPEST Attack (electromagnetic eavesdropping)

21. Supply Chain Attacks

  • SolarWinds Attack
  • CCleaner Supply Chain Attack
  • NotPetya (via software update)
  • ShadowHammer (ASUS Live Update)

22. Cloud Attacks

  • Cloud Data Breach
  • Account Hijacking
  • Cloud Misconfiguration Exploits
  • Cross-Cloud Exploitation
  • Denial-of-Service on Cloud Services

23. IoT and Embedded System Attacks

  • Firmware Injection
  • JTAG Debugging
  • Firmware Over-the-Air (FOTA) Exploits
  • Hardware Trojan

This list covers a broad spectrum of hacking techniques and attacks used by cybercriminals. Let me know if you'd like more information on a particular type of attack!

Post a Comment

0 Comments