1. Malware (Malicious Software) Attacks
- Virus
- Worm
- Trojan Horse
- Ransomware
- Spyware
- Adware
- Rootkit
- Backdoor
- Botnets
- Keylogger
- Cryptojacking
- Zero-day malware
- Malvertising
- Fileless malware
- Polymorphic malware
- Logic bombs
2. Phishing Attacks
- Spear Phishing
- Whaling
- Clone Phishing
- Voice Phishing (Vishing)
- SMS Phishing (Smishing)
- Business Email Compromise (BEC)
- CEO Fraud
- Angler Phishing (via social media)
- Pharming (DNS poisoning)
- Watering Hole Attack
3. Password Attacks
- Brute Force Attack
- Dictionary Attack
- Credential Stuffing
- Password Spraying
- Rainbow Table Attack
- Keylogger Attack
- Shoulder Surfing
- Credential Cracking
4. Denial of Service (DoS) & Distributed Denial of Service (DDoS) Attacks
- Volumetric DDoS
- SYN Flood Attack
- UDP Flood Attack
- Ping of Death
- Smurf Attack
- HTTP Flood
- DNS Amplification Attack
- ICMP Flood Attack
- Slowloris Attack
- Tear Drop Attack
- Fraggle Attack
5. Man-in-the-Middle (MITM) Attacks
- Session Hijacking
- SSL Hijacking
- Wi-Fi Eavesdropping
- Email Hijacking
- IP Spoofing
- DNS Spoofing
- HTTPS Spoofing
- ARP Spoofing
- Replay Attack
- On-path Attack
6. Social Engineering Attacks
- Baiting
- Pretexting
- Quid Pro Quo
- Tailgating
- Piggybacking
- Shoulder Surfing
- Dumpster Diving
- Impersonation
- Honey Trap
7. SQL Injection (SQLi) Attacks
- Union-based SQL Injection
- Error-based SQL Injection
- Blind SQL Injection
- Time-based Blind SQL Injection
- Boolean-based Blind SQL Injection
8. Cross-Site Scripting (XSS) Attacks
- Stored XSS (Persistent)
- Reflected XSS (Non-Persistent)
- DOM-based XSS
- Self XSS
9. Cross-Site Request Forgery (CSRF) Attacks
- Stored CSRF
- Reflected CSRF
- Login CSRF
10. DNS Attacks
- DNS Spoofing/Poisoning
- DNS Tunneling
- DNS Hijacking
- Domain Hijacking
- Cache Poisoning
- NXDOMAIN Attack
- Random Subdomain Attack
- Phantom Domain Attack
11. Insider Threats
- Malicious Insider (Sabotage)
- Negligent Insider
- Compromised Insider
- Third-Party Insider
12. Advanced Persistent Threats (APTs)
- APT1 (China-based group)
- APT28 (Fancy Bear)
- APT29 (Cozy Bear)
- Lazarus Group (North Korea)
- APT33 (Iranian hackers)
- Equation Group
- Operation Shady RAT
13. Cryptographic Attacks
- Birthday Attack
- Man-in-the-Middle Attack
- Padding Oracle Attack
- Chosen Ciphertext Attack
- Chosen Plaintext Attack
- Ciphertext-only Attack
- Replay Attack
- Side-channel Attack
- Weak-key Attack
14. Network and Protocol Attacks
- ARP Spoofing
- MAC Flooding
- ICMP Redirect Attack
- Routing Table Poisoning
- Session Hijacking
- SYN Flooding
- DNS Cache Poisoning
- Evil Twin Attack
- SSL/TLS Renegotiation Attack
- SSL Strip Attack
- IP Spoofing
15. Ransomware Attacks
- CryptoLocker
- WannaCry
- Petya/NotPetya
- Ryuk
- Maze
- REvil/Sodinokibi
- DarkSide
- LockBit
- Crysis
- TeslaCrypt
16. Exploit and Vulnerability Attacks
- Zero-Day Exploits
- Buffer Overflow Attack
- Heap Spray Attack
- Return-Oriented Programming (ROP) Attack
- Shellshock
- EternalBlue
- Spectre and Meltdown
- Rowhammer
- Privilege Escalation
- Directory Traversal
17. Web Application Attacks
- Local File Inclusion (LFI)
- Remote File Inclusion (RFI)
- Insecure Deserialization
- XML External Entity (XXE)
- Broken Authentication
- Server-Side Request Forgery (SSRF)
18. Wireless Attacks
- Evil Twin Attack
- Rogue Access Point
- WEP/WPA Cracking
- Bluetooth Hacking
- Bluejacking
- Bluesnarfing
- Bluebugging
- KRACK (Key Reinstallation Attack)
19. IoT (Internet of Things) Attacks
- Mirai Botnet
- IoT Device Hijacking
- IoT Ransomware
- BrickerBot (Permanent Denial-of-Service)
- Jamming Attacks
20. Physical and Hardware Attacks
- USB Drop Attack (BadUSB)
- Hardware Keyloggers
- Evil Maid Attack
- Cold Boot Attack
- DMA (Direct Memory Access) Attack
- TEMPEST Attack (electromagnetic eavesdropping)
21. Supply Chain Attacks
- SolarWinds Attack
- CCleaner Supply Chain Attack
- NotPetya (via software update)
- ShadowHammer (ASUS Live Update)
22. Cloud Attacks
- Cloud Data Breach
- Account Hijacking
- Cloud Misconfiguration Exploits
- Cross-Cloud Exploitation
- Denial-of-Service on Cloud Services
23. IoT and Embedded System Attacks
- Firmware Injection
- JTAG Debugging
- Firmware Over-the-Air (FOTA) Exploits
- Hardware Trojan
This list covers a broad spectrum of hacking techniques and attacks used by cybercriminals. Let me know if you'd like more information on a particular type of attack!

0 Comments