You are on page 1of 2

Methodologies and Attack Types

Methodologies/Attack Types being used by hackers and ethical hackers. Know what the
attack does and try implement in your own test lab.

Account Checkers (Bruteforce)


ARP Spoofing
Backdoor Persistence
Bait and Switch
Blue Keep Vulnerability
Botnet
Bruteforce Attack
Buffer Overflow
Carding
Carriage Return Line Feed – CRLF Injection
Clickjacking
Command Injection
Cookie Theft
Credential Stuffing
Cross Site Request Forgery – CSRF Injection
Cross Site Scripting – XXS Injection
Cryptography – AES, SHA, Blowfish, Hash Algorithms etc
CSV Injection
CVE Vulernabilities
Deep Dive
Defacement
Denial of Service
Directory Traversal Attack
DLL Injection
DNS Rebinding Attack
Doxing
Drive-by Attack
Dumpster Diving
E-whoring
Eavesdropping
Encoders & Encrypters
Evading Firewalls Honeypots and Intrusion Prevention Systems
Evil Maid Attack
Evil Twin Attack
Footprinting and Reconnaissance
FUD Crypter
Fuzzing
Google Hacking
Hacking Web Servers
Hash Cracking
Heartbleed Bug
IDN Homograph Attack
Input Validation
Kernel Exploits
Keylogger
Krack Attack
Local File Inclusion
Malicious Payloads
Malvertising
Malware – Trojan / Worms / Adware
Memory Leak
Mobile Hacking – IMSI Catcher, APK payloads
NTLMv2 Hashes
OS Command Injection
OSINT – Opensource Intelligence
Packet Generator
Pass the Hash
Pentesting
Phishing
Post Exploitation
Privilege Escalation
QRLjacking
RadioRF – Signal Intelligence
Redirect Manipulation
Remote Access Trojan
Remote Code Execution
Remote File Inclusion
Reverse Engineering
Rootkits
Session Hijacking
Session Variable Overloading
Shellcode
SMS & Bluetooth Spoofing
Sniffing
Social Engineering
SOCKS5 Proxy
Spear Phishing
SQL Injection
Stack – Heap Overflow
Steganography
Token Generation and Manipulation
Undefined Behaviour
Vulernability Research
Wardriving
Waterhole Attack
Web Application Attacks
Web Scraper
Webshells
Whaling
Wireless Hacking WEP/WPA/WPA2/WPA3
XML External Entity
Zeroday Exploit

By: SaM

You might also like