COMMON CYBER ATTACKS

COMMON CYBER ATTACKS

This article consists of some common hacking attacks. In this article we are going to see different types of cyber attacks, their types and how they affect our secure data or privacy. Cyber attacks are taking place everyday in the world. Every year a lot of malicious attacks are increasing which causing distraction to vulnerable systems.
1. DDOS:
DDOS is known as distributed-denial-of-service. This attack takes over the system resources launches from large number of other malicious software systems which is controlled by the attacker so that it can't response to service requests. Affected devices may includes systems and other networked devices like IOT devices. DDOS attack is just like traffic jam blocking up with highway preventing regular traffic from arriving at its desired destination. In this attack the hacker needs to gain control of bunch of online systems of network to carry out the attack. The first DDOS attack occurred on July 22, 1999.
TYPES OF DDOS ATTACKS:  
  • SYN flood
  • UDP flood
  • HTTP flood 
  • Ping of death
  • Smurf attack
  • Fraggle attack
  • Slowloris 
2. SQL INJECTION:
SQL is known as Structured Query Language. As we know a lot of services use SQL to store data in the database. In SQL injection the attacker targets this kind of servers using variety of malicious codes to get into the server and reveals sensitive data and information. This type of attack happens if there is any known SQL vulnerabilities and it works by exploiting that vulnerability. In order to run SQL commands this commands are inserted into data plane input if the exploit becomes successful then the attacker can have access to sensitive data in the database as the attacker can modify, read and also delete the data. SQL injection was first discovered in the year 1998.
TYPES OF SQL INJECTION: 
  • Blind SQL injection
  • Out-of-Band injection
  • Unsanitized input.     
3. MITM:
MITM is known as Man-in-the-middle attack. MITM attack is when an attacker intercepts communication between two systems either to eavesdrop or modify the traffic this allows them to intercept information in both directions. MITM also known as eavesdropping attack. This attack has the ability of exploiting the real time processing of transactions and also transfer of information. The agenda of this attack is to steal credentials and corrupt data etc.
TYPES OF MITM: 
  • IP spoofing
  • DNS Spoofing
  • HTTPS spoofing
  • SSL hijacking
  • E-mail hijacking
  • WI-FI eavesdropping
  • Stealing Browser Cookies
4. BRUTE FORCE ATTACK:
A Brute Force attack consists of a hacker trying many different passwords and passphrases in order to get correct credentials. This type of attacks are simple and constant. It is also known as exhaustive search. This attack consumes lot of time difficult to perform. The main aim of this attack is to get passwords that are used to access accounts and networks. IT specialists use this attack to test network security and strength of encryption used on the network. To prevent from this attack using strong passwords is one of the method.
TYPES OF BRUTE FORCE ATTACKS:
  • Hybrid Brute Force
  • Reverse Brute Force
  • Credential Stuffing
5. PHISHING:
Phishing refers to sending of fraudulent communications that appears to be came from a trusted source mainly using email. It can be a link that loads malware stuff into your system. Phishing is one of the commonly used cyber attack by the hackers to gain details regarding credit cards, login information etc. In order to prevent phishing attacks, verifying attachments and links is important. According to the internet sources the term phishing was used in the year 1996.
TYPES OF PHISHING ATTACKS:
  • Email phishing
  • Spear phishing
  • Whaling
  • Smishing 
  • Vishing
  • Angler phishing

For more interesting hacking related topics stay connected to this blog by subscribing: hackersocietyblog


Post a Comment

0 Comments