There are various types of hacking attacks :>>>>
1. VIRUS ATTACK:The most common attack is virus attack.They are self duplicating programs that infects and attach with other executable files on victims system.
2. WORMS:worms are self-replicating programs or code fragments that attach themselves to other programs or machines (worms).Worms attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail.
3. TROJAN HORSE: A Trojan is a malicious program disguised as something benign. Trojans are often downloaded along with another program or software package. Once installed on a system, they can cause data theft and loss, and system crashes or slowdowns . Many Trojans are used to manipulate files on the victim computer, manage processes, remotely run commands, intercept keystrokes, watch screen images, and restart or shut down infected hosts.
4.BACK DOORS: A backdoor is a program or a set of related programs that a hacker installs on a target system to allow access to the system at a later time. A backdoor’s goal is to remove the evidence of initial entry from the system’s log files. But a backdoor may also let a hacker retain access to a machine it has penetrated even if the intrusion has already been detected and remedied by the system administrator.
5. DENIAL OF SERVICE: A DoS attack is an attempt by a hacker to flood a user’s or an organization’s system.DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic (which can be e-mail or Transmission Control Protocol, TCP, packets).Distributed DoSs (DDoS5) are coordinated DoS attacks from multiple sources. A DDoS is more difficult to block because it uses multiple, changing, source IP addresses.
6.SNIFFING: Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple eavesdropping or something more sinister. Sniffers are used to capture traffic sent between two systems. Depending on how the sniffer is used and the security measures in place, a hacker can use a sniffer to discover user names, passwords, and other confidential information transmitted on the network.
7. SPOOFING: Spoofing is the act of sending an illegitimate packet with an expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping.
8. PHISHING: Phishing involves sending an e-mail, usually posing as a bank, credit-card company, or other financial organization. The e-mail requests that the recipient confirm banking information or reset passwords or PIN numbers. The user clicks the link in the e-mail and is redirected to a fake website.
9. INSIDE JOBS: Most security breeches originate inside the network that is under attack. Inside jobs include stealing passwords (which hackers then use or sell), performing industrial espionage, causing harm (as disgruntled employees), or committing simple misuse. Sound policy enforcement and observant employees who guard their passwords and PCs can thwart many of these security breeches.
10. ROGUE ACCESS POINTS:Rogue access points (APs) are unsecured wireless access points that outsiders can easily breech. (Local hackers often advertise rogue APs to each other.) Rogue APs are most often connected by well-meaning but ignorant employees.
only for educational and knowledge purposes
1. VIRUS ATTACK:The most common attack is virus attack.They are self duplicating programs that infects and attach with other executable files on victims system.
2. WORMS:worms are self-replicating programs or code fragments that attach themselves to other programs or machines (worms).Worms attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail.
3. TROJAN HORSE: A Trojan is a malicious program disguised as something benign. Trojans are often downloaded along with another program or software package. Once installed on a system, they can cause data theft and loss, and system crashes or slowdowns . Many Trojans are used to manipulate files on the victim computer, manage processes, remotely run commands, intercept keystrokes, watch screen images, and restart or shut down infected hosts.
4.BACK DOORS: A backdoor is a program or a set of related programs that a hacker installs on a target system to allow access to the system at a later time. A backdoor’s goal is to remove the evidence of initial entry from the system’s log files. But a backdoor may also let a hacker retain access to a machine it has penetrated even if the intrusion has already been detected and remedied by the system administrator.
5. DENIAL OF SERVICE: A DoS attack is an attempt by a hacker to flood a user’s or an organization’s system.DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic (which can be e-mail or Transmission Control Protocol, TCP, packets).Distributed DoSs (DDoS5) are coordinated DoS attacks from multiple sources. A DDoS is more difficult to block because it uses multiple, changing, source IP addresses.
6.SNIFFING: Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple eavesdropping or something more sinister. Sniffers are used to capture traffic sent between two systems. Depending on how the sniffer is used and the security measures in place, a hacker can use a sniffer to discover user names, passwords, and other confidential information transmitted on the network.
7. SPOOFING: Spoofing is the act of sending an illegitimate packet with an expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping.
8. PHISHING: Phishing involves sending an e-mail, usually posing as a bank, credit-card company, or other financial organization. The e-mail requests that the recipient confirm banking information or reset passwords or PIN numbers. The user clicks the link in the e-mail and is redirected to a fake website.
9. INSIDE JOBS: Most security breeches originate inside the network that is under attack. Inside jobs include stealing passwords (which hackers then use or sell), performing industrial espionage, causing harm (as disgruntled employees), or committing simple misuse. Sound policy enforcement and observant employees who guard their passwords and PCs can thwart many of these security breeches.
10. ROGUE ACCESS POINTS:Rogue access points (APs) are unsecured wireless access points that outsiders can easily breech. (Local hackers often advertise rogue APs to each other.) Rogue APs are most often connected by well-meaning but ignorant employees.
only for educational and knowledge purposes
No comments:
Post a Comment