Active_Attacks_Flashcards
Man-in-the-Middle (MITM)
Intercepting communications to read, alter, or inject data.
Session Hijacking
Taking over an active user session by stealing cookies or session tokens.
Spoofing
Impersonating another device or user, such as IP or DNS spoofing.
Injection Attacks
Inserting malicious code or commands into input fields or data streams.
Replay Attacks
Capturing and resending valid data packets for unauthorized actions.
Denial-of-Service (DoS)
Overloading a system with requests to make it unavailable.
Distributed Denial-of-Service (DDoS)
Multiple systems flooding a target to overwhelm resources.
Logic Bombs
Malware triggered by specific conditions to disrupt operations.
Privilege Escalation
Exploiting bugs to gain unauthorized higher-level permissions.
Buffer Overflow
Overwriting memory regions to execute arbitrary code.
Zero-Day Exploits
Attacking vulnerabilities not yet patched or publicly known.
Trojan Horse
Malicious software disguised as legitimate.
Ransomware
Encrypting user data and demanding payment for the decryption key.
Worms
Self-replicating malware that spreads across networks.
Spyware/Adware
Collecting sensitive information or displaying unwanted advertisements.