List of Attack that hacker use

Attacks have been happening more and more all around the world, with many of the world’s governments, businesses, and individuals all being targeted for attack. Much information has been stolen and put on display, and many people have been embarrassed. But now, the US government is trying to do something to help potential victims of hack attacks.

The Government Accountability Office helps to organize and assist people with security and other accountability issues. According to a recent report, there has been an increase in hack attacks of over 650% in the last five years, and it seems like everyone is a target. There is also a list of the different kinds of hack attacks being used by hackers today. Please read the list to gain a better understanding of hacking:


• Cross-site scripting: An attack that uses third-party web resources to run script within the victim’s web browser or scriptable application. This is what happens when you visit a malicious site or click a bad link. When this happens, a hacker could easily gain access to your computer and log key strokes, information exchanged, and even control your computer remotely.

• Denial-of-service: An attack that temporarily “breaks” a site, so no one can access it or use it.

• Distributed denial-of-service: A modified version of the denial-of-service attack that is done by multiple hackers. This can take a site down for several hours, perhaps even days.

• Logic bomb: Programming code placed on your computer that allows your computer to be hacked under the right circumstances.

• Phishing: A hacker sends fake emails to you that request your personal or financial information, or takes you to a site that requests that information.

• Passive wiretapping: Recording data without a person’s knowledge when information is exchanged openly. There doesn’t necessarily have to be any data alteration to passively wiretap.

• SQL injection: An attack that involves the alteration of a database search in a web-based application, which can be used to obtain unauthorized access to sensitive information in a database.

• Trojan horse: A computer program that looks and acts like a normal program that anyone would use regularly, but is secretly stealing information or changing data on your computer.

• Virus: A computer program that can copy itself and infect a computer without the permission or knowledge of the user. A virus might corrupt or delete data on a computer, use e-mail programs to spread itself to other computers, or even erase everything on a hard disk. Unlike a computer worm, a virus requires human involvement (usually unwitting) to propagate.

• War driving: The method of driving through cities and neighborhoods with a wireless-equipped computer — sometimes with a powerful antenna — searching for unsecured wireless networks.

• Worm: A self-replicating, self-propagating, self-contained program that uses network mechanisms to spread itself. Unlike computer viruses, worms do not require human involvement to propagate.

• Zero-day exploit: An exploit that takes advantage of a security vulnerability previously unknown to the general public. In many cases, the exploit code is written by the same person who discovered the vulnerability.
By writing an exploit for the previously unknown vulnerability, the attacker creates a potent threat since the compressed time frame between public discoveries of both makes it difficult to defend against.

No comments:

Powered by Blogger.