TopAttack - Úvod  Hacking  Top Attack  Infiltration  Communication  Webové útoky (67)  Síťové útoky (32)  Databázové útoky (7)

Úvod  Web  Database  Síťové 

Síťové

Název

 

Popis

Port

Browser Attacks

 

 

 

Browser-based network attacks tied for the second-most common type. They attempt to breach a machine through a web browser, one of the most common ways people use the internet.

 

Brute Force Attacks

 

 

 

Brute force attacks are akin to kicking down the front door of a network. Rather than attempting to trick a user into downloading malware, the attacker tries to discover the password for a system or service through trial and error.

 

Denial-of-Service (DDoS) Attacks

 

 

 

Denial-of-service attacks, also known as distributed denial-of-service attacks (DDoS), are third on the list on the list of network security attacks, and they continue to grow stronger every year.

 

Worm Attacks

 

 

 

Malware typically requires user interaction to start infection. For example, the person may have to download a malicious email attachment, visit an infected website, or plug an infected thumb drive into a machine.

 

Malware Attacks

 

 

 

Malware is, of course, malicious software – applications that have been created to harm, hijack, or spy on the infect system.

 

Web Attacks

 

 

 

Public-facing services – such as web applications and databases – are also targeted for network security attacks.

 

Scan Attacks

 

 

 

Rather than outright network attacks, scans are pre-attack reconnaissance. Attackers use widely available scanning tools to probe public-facing systems to better understand the services, systems, and security in place.

 

Other Attacks

 

 

 

We can only speculate on the network attack types bundled into “other”. That said, here are some of the usual suspects.