Hacking Techniques
100

This type of attack floods a system with traffic to make it unavailable to users.

unavailable to users.What is a DDoS (Distributed Denial of Service) attack?

200

A hacker who exploits vulnerabilities for malicious purposes is known by this color-coded term.

What is a black hat hacker?

300

This technique involves intercepting communication between two parties to steal data.

What is a man-in-the-middle attack?

400

This type of attack tricks a user into executing malicious code by disguising it as legitimate.

What is a phishing attack?

500

This hacking method involves guessing passwords using dictionaries or random combinations.

What is a brute-force attack?

M
e
n
u