Smart Card Guy

Smart Card / Java Card, Cyber Security, IoT Device Security, Root of Trust, 標準化等

Top 25 Cyber Attack Methods Used by Hackers - 2022

ethicalhackersacademy.com

List

  1. Hoaxes
  2. Social Engineering
  3. Denial of Service (DoS)
  4. Man-in-the-Middle (MITM)
  5. Buffer Overflows
  6. Data Injection
  7. Cross-site Scripting (XSS)
  8. Cross-site Request Forgery
  9. Privilege Escalation
  10. DNS Poisoning and Domain Hijacking
  11. Zero-Day Attacks
  12. Replay Attacks
  13. Client Hijacking Attacks
  14. Driver Manipulation
  15. Spoofing
  16. Wireless Replay Attacks
  17. Rogue Access Points and Evil Twins
  18. Remote code execution
  19. WPS Attacks
  20. Bluejacking and Bluesnarfing
  21. Wireless Attacks
  22. Cryptographic Attacks
  23. SQL Injection Attacks (SQLi)
  24. Tailgating and Impersonation
  25. Spear phishing