Security: Types of Attacks - Paiet/Tech-Journal-for-Everything GitHub Wiki
Social engineering
Phishing
Basic scam aimed at as many people they can
Using for example, brand trust like Walmart, Google, PayPal....etc
Spear phishing
More sophisticated phishing attack
Appears to come from a relative, friend, co-worker, your bank,
Involves some reconnaissance
Whaling
Most sophisticated phishing attack
Attacker(s) assume the identity of a C'level employee such as CEO or CFO, company attorney using insider threat actors
Vishing
A phishing attack carried out via voice technologies
Landline, VoIP, Voice mail/message, cell phone
Example
Victim is warned out potential suspicious activities on credit card accounts, bank accounts, mortgage accounts...etc
Tailgating
Impersonation
Dumpster diving
Shoulder surfing
Hoax
Watering hole attack
This attack targets a group of people that work together by infecting websites that the group is known to visit. It only takes a single user to get infected to gain access to the network.
Principles (reasons for effectiveness)
Authority
People are conditioned to respond to authority
Intimidation
Using implied authority for means of propagating an attack
Two higher ranking military personel
Consensus
When a user does not know how to react (say to an email), so they will look to others to see how to react (to click the email, to respond to the email)
Scarcity
People are more likely to respond to scams when there is a time or availability concern
Download "this add-on" to view the page
Not being able to view a page until a program to install can make the victim see it even more.
Familiarity
People are comfortable with those they are familiar with
Trust
First objective is to establish trust
Urgency
Application/service attacks
DoS
DDoS(diagram)
Man-in-the-middle
Buffer overflow
Injection
Cross-site scripting
Malicious script embedded in a trusted web application that is executed against a victim
Redirect the user, extract private data
Cross-site request forgery
The users browswer is forced to attack the website performing, for example fund transfers, email address changes
So the user sends malicious requests to the website(by the malicious script)
Privilege escalation
ARP poisoning(diagram)
Amplification(Increasing the payload)
DNS poisoning(diagram)
Domain hijacking
Transference of a domain from the original owner, purchaser to another registrar through malicious or fradualent means
Often go undisputed
Hard to reverse
ICANN's Registrar Transfer Dispute Resolution Policy to seek the return of the domain