Types of Cyber Attack
Types of Cyber Attack
system
These can be classified into
Web-based attacks
These are the attacks on a website or web application
System-based attacks
Attacks that are intended to compromise a computer or a computer network
Web-based attacks
Injection attacks
In this type of attacks, some data will be injected into a web applications to manipulate
the application and get required information
Ex: SQL Injection, Code Injection, Log Injection, XML Injection etc.,
This can be done by editing javascript in a webpage such that it will be executed in client
browser
It can be classified into
Reflected XSS attack
Stored XSS attack
DOM-based XSS attack
DNS Spoofing
DNS spoofing (or DNS cache poisoning) is a computer hacking attack, whereby data is
introduced into a Domain Name System (DNS) resolver's cache, causing the name server
to return an incorrect IP address, diverting traffic to the attacker's computer (or any other
computer).
Web-based attacks
Brute force
Dictionary attack
Contains a list of commonly used passwords and validate them to get original password
Buffer overflow
occurs when a program or process tries to store more data in a buffer (temporary data
storage area) than it was intended to hold
Web-based attacks
Session hijacking
Web applications uses cookies to store state and details of user sessions
By stealing the cookies, and attacker can have access to all of user data
URL interpretation
By changing certain parts of a URL, one can make a web server to deliver web pages for
which he is not authorized to browse
Social engineering
Man-in-the-middle attack
Attacker intercepts the connection between
them
Attacker will be able to read, insert and modify
Phishing
Phishing is the attempt to acquire sensitive information, often for malicious reasons, by
masquerading as a trustworthy entity in an electronic communication
Spear phishing
It is a form of phishing, which targets specific organizations for confidential data
Whaling
In whaling, the targets are high-ranking bankers, executives or others in powerful positions or job titles
System-based attacks
Virus
Worm
Trojan horse
Backdoors
Bots
Spoofing
Sniffing
Port scanning