Common Attacks

The Peacock
  1. Brute force
  2. Advanced Persistent Threat (APT)
  3. Multi-vector, polymorphic attacks
  4. Denial of Service
  5. Buffer Overflows
  6. Mobile Code: ActiveX, JavaApplet, Flash, JavaScript
  7. Malicious Software (Malware)
  8. Drive-by download attacks
  9. Spyware
  10. Trojan Horse
  11. Keyloggers
  12. Password Crackers
  13. Spoofing/Masquerading
  14. Sniffers, Eavesdropping, and Tapping
  15. Emanations and TEMPEST
    Spontaneous emission of electromagnetic radiation” (EMR) subject to TEMPEST eavesdropping
  16. Shoulder Surfing
  17. Tailgating
  18. Piggybacking
  19. Object Reuse
  20. Data Remanence
  21. Unauthorized Targeted Data Mining
  22. Dumpster Diving
  23. Backdoor/Trapdoor
  24. Maintenance Hook
  25. Logic bombs
  26. Social Engineering
  27. Phishing
  28. Pharming
    A cyber attack intended to redirect a website’s traffic to another, fake site.
  29. Covert Channel
    Unauthorized channel for data transportation
  30. IP Spoofing/Masquerading
    IP Spoofing is malicious, while Masquerading is a specific form of Network Address Translation (NAT) and can be valid.
  31. Elevation of privilege/Privilege escalation
  32. Tampering
  33. Sabotage
  34. SQL injection
  35. Cross-Site Scripting (XSS)
  36. Session Hijacking and Man-in-the-Middle Attacks
  37. Zero-day exploit
    A zero-day exploit hits after a network vulnerability is announced or discovered but before a patch or solution is implemented.
  38. Race condition
  39. TOC/TOU
  40. Aggregation and Inference
  41. Data diddling
  42. Salami attack
  43. Frequency analysis (against classical ciphers)
  44. Cryptanalytic attacks: Ciphertext only, Known plaintext, Chosen ciphertext, *Chosen plaintext (CPA)
  45. Implementation attacks: Side-Channel Analysis (active or passive) and Fault Analysis (active), e.g., Timing attack and Differential fault analysis
  46. Man-in-the-Middle (MITM)
  47. Meet-in-the-Middle
  48. Birthday attack
  49. ARP poisoning
  50. DNS cache poisoning/spoofing

2 thoughts on “Common Attacks


  2. Pingback: 常見攻擊(Common Attacks) – Choson資安大小事

Leave a Reply