vSaMv

Methodologies and Attack Types

Apr 28th, 2020
2,122
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.02 KB | None | 0 0
  1. Methodologies and Attack Types
  2.  
  3. Methodologies/Attack Types being used by hackers and ethical hackers. Know what the attack does and try implement in your own test lab.
  4.  
  5. Account Checkers (Bruteforce)
  6. ARP Spoofing
  7. Backdoor Persistence
  8. Bait and Switch
  9. Blue Keep Vulnerability
  10. Botnet
  11. Bruteforce Attack
  12. Buffer Overflow
  13. Carding
  14. Carriage Return Line Feed – CRLF Injection
  15. Clickjacking
  16. Command Injection
  17. Cookie Theft
  18. Credential Stuffing
  19. Cross Site Request Forgery – CSRF Injection
  20. Cross Site Scripting – XXS Injection
  21. Cryptography – AES, SHA, Blowfish, Hash Algorithms etc
  22. CSV Injection
  23. CVE Vulernabilities
  24. Deep Dive
  25. Defacement
  26. Denial of Service
  27. Directory Traversal Attack
  28. DLL Injection
  29. DNS Rebinding Attack
  30. Doxing
  31. Drive-by Attack
  32. Dumpster Diving
  33. E-whoring
  34. Eavesdropping
  35. Encoders & Encrypters
  36. Evading Firewalls Honeypots and Intrusion Prevention Systems
  37. Evil Maid Attack
  38. Evil Twin Attack
  39. Footprinting and Reconnaissance
  40. FUD Crypter
  41. Fuzzing
  42. Google Hacking
  43. Hacking Web Servers
  44. Hash Cracking
  45. Heartbleed Bug
  46. IDN Homograph Attack
  47. Input Validation
  48. Kernel Exploits
  49. Keylogger
  50. Krack Attack
  51. Local File Inclusion
  52. Malicious Payloads
  53. Malvertising
  54. Malware – Trojan / Worms / Adware
  55. Memory Leak
  56. Mobile Hacking – IMSI Catcher, APK payloads
  57. NTLMv2 Hashes
  58. OS Command Injection
  59. OSINT – Opensource Intelligence
  60. Packet Generator
  61. Pass the Hash
  62. Pentesting
  63. Phishing
  64. Post Exploitation
  65. Privilege Escalation
  66. QRLjacking
  67. RadioRF – Signal Intelligence
  68. Redirect Manipulation
  69. Remote Access Trojan
  70. Remote Code Execution
  71. Remote File Inclusion
  72. Reverse Engineering
  73. Rootkits
  74. Session Hijacking
  75. Session Variable Overloading
  76. Shellcode
  77. SMS & Bluetooth Spoofing
  78. Sniffing
  79. Social Engineering
  80. SOCKS5 Proxy
  81. Spear Phishing
  82. SQL Injection
  83. Stack – Heap Overflow
  84. Steganography
  85. Token Generation and Manipulation
  86. Undefined Behaviour
  87. Vulernability Research
  88. Wardriving
  89. Waterhole Attack
  90. Web Application Attacks
  91. Web Scraper
  92. Webshells
  93. Whaling
  94. Wireless Hacking WEP/WPA/WPA2/WPA3
  95. XML External Entity
  96. Zeroday Exploit
  97.  
  98. By: SaM
Add Comment
Please, Sign In to add comment