Types Of Attacks

:::::::::::::::: \m/ Types Of Attacks \m/ ::::::::::::::::
1. Denial of Service –
DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic(which can be e-mail or Transmission Control Protocol, TCP, packets).
2. Distributed DoSs
Distributed DoSs (DDoSs) are coordinated DoS attacks from multiple sources. A DDoS is more difficult to block because it uses multiple, changing, source IP addresses.
3. Sniffing
Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple eavesdropping or something more sinister.

4. Spoofing
Spoofing is the act of sending an illegitimate packet with an expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping
5. SQL injection
SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. It uses normal SQL commands to get into database with elivated  privellages..
6. Back Doors
Hackers can gain access to a network by exploiting back doors administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid of computerized searchers (bots), hackers can probably find any weakness in the network.
7. Trojan Horses –
Trojan horses, which are attached to other programs, are the leading cause of all break-ins. When a user downloads and activates a Trojan horse, the software can take the full control over the system and you can remotely control the whole system.They are also reffered as RATs(Remote Administration tools)
8. Brute-Forcing –
Brute-Forcring is sometimes the Most Tiring Job.A Brute-Force attack on a Network.It tries all the Password Combinations possible.Many Times,Brute-Forcing doesn’t works because of Connection Times Out.
9. Secret Question –
According to a survey done by security companies, it is found that rather than helping the legitimate users the security questions are more useful to the hackers.A hacker Can create a Fake Account and act as being someone else and in the meantime will get your trust and ask your Personal Secret Questions like In which Village was Your Mother Born? What was the Name of your First Grade Teacher? On what street where you Born? On what street your father livend in his Childhood? etc etc.It is upto you to Dodge People like this and Block them if You Find them Suspicious.
10. Social Engineering –
This was one of the oldest trick to hack.. Try to convince your user that you are a legitimate person from the system and needs your password for the continuation of the service or some maintenance.This won’t work now since most of the users are now aware about the Scam.
11. Phishing –
This is another type of keylogging, here you have to bring the user to a webpage created by you resembling the legitimate one and get him to enter his password, to get the same in your mail box.Most of the Users now are aware of this attack but a Elite Hacker can come up with different ways of Phishing attacks.
12. Fake Messengers –
Hackers Make Fake Applications pretending to be Some Social Messengers and When You Open them,Some RAT/Virus/Trojan is Executed.
13. Cookie Stealer –
Cookies Stealing also known as Session Hijacking asks a victim to open a fake site and When the Victim is Online,HIs Cookies are sent to the hacker and While the Victim is online,his account’s passoword is cracked and the hacker is inside his account

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s