Senin, 06 Januari 2014

Kategori Attack Hacker


Kategori Attack Hacker
                Serangan hacker ! sebenarnya ada banyak sekali tipe-tipe serangan hacker yang bisa dilakukan untuk melakukan sebuah hack, tidak hanya injection saja tapi masih banyak sekali tipe serangan hacker yang bisa para hacker coba. Berikut adalah tipe –tipe serangan hacker :
A
  • Account lockout attack
  • Asymmetric resource consumption (amplification)
B
  • Binary planting
  • Blind SQL Injection
  • Blind XPath Injection
  • Brute force attack
  • Buffer overflow attack
C
  • Cache Poisoning
  • Cash Overflow
  • Code Injection
  • Command Injection
  • Comment Injection Attack
  • Content Security Policy
  • Content Spoofing
  • CORS OriginHeaderScrutiny
  • CORS RequestPreflighScrutiny
  • Cross Frame Scripting
  • Cross Site History Manipulation (XSHM)
  • Cross Site Tracing
  • Cross-Site Request Forgery (CSRF)
  • Cross-site Scripting (XSS)
  • Cross-User Defacement
  • Cryptanalysis
C cont.
  • CSRF
  • Custom Special Character Injection
D
  • Denial of Service
  • Direct Dynamic Code Evaluation ('Eval Injection')
  • Direct Static Code Injection
  • Double Encoding
E
  • Execution After Redirect (EAR)
F
  • Forced browsing
  • Format string attack
  • Full Path Disclosure
H
  • HTTP Request Smuggling
  • HTTP Response Splitting
I
  • Inyección SQL
L
  • LDAP injection
M
  • Man-in-the-browser attack
  • Man-in-the-middle attack
  • Mobile code: invoking untrusted mobile code
  • Mobile code: non-final public field
  • Mobile code: object hijack
O
  • One-Click Attack
  • Overflow Binary Resource File
P
  • Page Hijacking
  • Parameter Delimiter
P cont.
  • Path Manipulation
  • Path Traversal
R
  • Reflected DOM Injection
  • Regular expression Denial of Service - ReDoS
  • Relative Path Traversal
  • Repudiation Attack
  • Resource Injection
S
  • Server-Side Includes (SSI) Injection
  • Session fixation
  • Session hijacking attack
  • Session Prediction
  • Setting Manipulation
  • Special Element Injection
  • Spyware
  • SQL Injection
T
  • Traffic flood
  • Trojan Horse
U
  • Unicode Encoding
W
  • Web Parameter Tampering
  • Windows ::DATA alternate data stream
X
  • XPATH Injection
  • XPATH Injection Java
  • XSRF
Sumber : Disini

Tidak ada komentar:

Posting Komentar

 
Cyber Under Network © 2011 Templates | uzanc