Types of Attacks
Hacking 101
Types of Malware Attacks
100

When a hacker uses emails, fake links, or attachments to gain access.

Phishing

100

Information gathering, social engineering, locate network range, which phase is it?

Reconnaissance

100

Malware that has the primary function to duplicate itself and spread to uninfected computers while staying active on infected systems.

Worm

200

A malicious software that enters a user’s computer to gather data to send it to a third party without the user's consent.

Spyware

200

When an ethical hacker tries to maintain future access by installing backdoors in the target system using Metasploit tool. Which phase is this?

Maintaining Access Phase

200

Malware that is designed to encrypt files on a device making any files and systems that rely on them unusable so a ransom will be paid in exchange for the malicious actor to decrypt the files.

Ransomware

300

The hacker tries to guess the password by using different combinations of letters, numbers and signs, by using one or more computers to do the work.

Password Cracking - Brute Force

300

When an ethical hacker erases any clues that shows a hacker has been in the exploited system.

Covering Tracks Phase

300

A network of hijacked computers that have been infected with bot malware and controlled remotely by a hacker

Bot/Botnet

400

Hackers use a program to record the pattern and order of keys typed on the user's device.

Keylogging

400

This is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system.

Penetration Testing

400

A fake program downloaded on a computer which compromises the computer system, replicates itself and locks the user out of files and other information.

Virus

500

sa' or '1'='1

SQL INJECTION

500

Human-based & Computer-based ____________ : the art of manipulating people to get confidential information.

Social Engineering

500

A malware program that includes a back door for administrative control over the targets’ computer, and often used in social engineering.

Trojan

M
e
n
u