ethicalhackersacademy.com
List
- Hoaxes
- Social Engineering
- Denial of Service (DoS)
- Man-in-the-Middle (MITM)
- Buffer Overflows
- Data Injection
- Cross-site Scripting (XSS)
- Cross-site Request Forgery
- Privilege Escalation
- DNS Poisoning and Domain Hijacking
- Zero-Day Attacks
- Replay Attacks
- Client Hijacking Attacks
- Driver Manipulation
- Spoofing
- Wireless Replay Attacks
- Rogue Access Points and Evil Twins
- Remote code execution
- WPS Attacks
- Bluejacking and Bluesnarfing
- Wireless Attacks
- Cryptographic Attacks
- SQL Injection Attacks (SQLi)
- Tailgating and Impersonation
- Spear phishing