Created by Chad Shreffler
over 5 years ago
|
||
Armored Virus
Companion Virus
Macro Virus
Multipartite Virus
Phage Virus
Polymorphic Virus
Retrovirus
Stealth Virus
Crypto-malware or Ransomware
Worms
Trojans
Rootkit
Keylogger
Spyware/Adware
Bots
Botnet
RAT (Remote Access Trojans or Remote Administration Tools)
Logic Bomb
Backdoor
Advanced Persistent Threat (APT)
Phishing
Spear Phishing
Whaling
Vishing
Pharming
Tailgating AKA Piggy-backing
Dumpster diving
Shoulder surfing
Hoax
Swatting
Watering hole attack
Denial of Service (DoS)
Distributed Denial of Service (DDoS)
Man-in-the-middle
Buffer overflow
Injection
Cross-site scripting
Cross-site request forgery
Privilege Escalation
Amplification
Zero day
Replay – AKA Masquerading or Impersonation
Clickjacking
Session hijacking (Cookie hijacking)
URL hijacking/Typo squatting
Domain Hijacking/DNS poisoning
Domain Hijacking/DNS Spoofing
Network hijacking/MAC Spoofing
Network hijacking/IP Spoofing
ARP poisoning AKA ARP Spoofing
Shimming
Refactoring
Evil twin
Rogue AP
Jamming
Bluejacking
Bluesnarfing
Birthday Attack
Frequency Analysis
Rainbow tables
Dictionary
Brute force
Pass the hash
Threat
Threat Actor
Script Kiddies
Hacktivist
Organized crime
Nation states
Insiders
Competitors
Open-Source Intelligence (OSINT)
Deep Web
Dark Web
Dark Web Market
Penetration (Pen) Test
Active Reconnaissance
Passive Reconnaissance
Pivot
Initial Exploitation
Persistence
Black Box
White Box
Gray Box
Vulnerability Scanning
Risk Assessment
Race conditions
End-of-Life Systems
Embedded Systems
System Sprawl