Home Common Problem What are the 4 main types of cyber attacks?

What are the 4 main types of cyber attacks?

Oct 25, 2019 pm 05:55 PM
Network attacks type

What are the 4 main types of cyber attacks?

The operating environment of this tutorial: Windows 10 system, Dell G3 computer.

The current network attack model is multi-faceted and multi-method, making it difficult to guard against. Generally speaking, they are divided into four categories: denial of service attacks, exploitation attacks, information collection attacks, and fake news attacks.

1. Denial of service attack

Denial of service attack attempts to prevent you from providing services by crashing your service computer or overwhelming it. Denial of service attack is the most common Easily implemented attacks:

teardrop

Overview: Teardrop attacks exploit information contained in the headers of packets in IP fragments that are trusted by the TCP/IP stack implementation to implement your own attack. IP fragments contain information indicating which part of the original packet the fragment contains. Some TCP/IP (including NT before servicepack 4) will crash when receiving forged fragments containing overlapping offsets.

Defense: The server applies the latest service pack, or reassembles segments when setting up a firewall instead of forwarding them.

2. Exploitation attack

Exploitation attack is a type of attack that attempts to directly control your machine:

Trojan horse

Overview: A Trojan horse is a program that is secretly installed on a target system either directly by a hacker or by an unsuspecting user. Once the installation is successful and administrator rights are obtained, the person who installed the program can directly control the target system remotely.

The most effective one is called backdoor program. Malicious programs include: NetBus, BackOrifice and BO2k, and benign programs used to control the system such as: netcat, VNC, pcAnywhere. The ideal backdoor operates transparently.

Defense: Avoid downloading suspicious programs and refusing to execute them, and use network scanning software to regularly monitor the listening TCP service on the internal host.

3. Information collection attacks

Information collection attacks do not cause harm to the target itself. As the name suggests, this type of attack is used to provide useful information for further intrusions. Information. Mainly include: scanning technology, architecture probing, and use of information services

(1) Address scanning

Overview: Use programs such as ping to detect target addresses, and responses to this indicate its existence.

Defense: Filter out ICMP reply messages on the firewall.

(2) Architecture detection

Overview: Hackers use automated tools with a database of known response types to examine responses from the target host to bad packet transmissions . Since each operating system has its own unique response method (for example, the specific implementation of the TCP/IP stack is different between NT and Solaris), by comparing this unique response with known responses in the database, hackers can often determine The operating system that the target host is running.

Defense: Remove or modify various banners, including those of the operating system and various application services, and block ports used for identification to disrupt the opponent's attack plan.

(3) Utilize information services

DNS domain conversion

Overview: The DNS protocol does not authenticate conversions or informational updates, which makes the protocol regarded as Utilize it in different ways. If you maintain a public DNS server, a hacker can obtain the names and internal IP addresses of all your hosts by performing a domain translation operation.

Defense: Filter out domain conversion requests at the firewall.

4. Fake message attack

is used to attack messages with incorrect target configuration, mainly including: DNS cache pollution and fake emails.

DNS Cache Pollution

Overview: Because DNS servers exchange information with other name servers without authentication, this allows hackers to incorporate incorrect information and compromise users. Directed to the hacker's own host.

Defense: Filter inbound DNS updates on the firewall. External DNS servers should not be able to change what your internal servers know about internal machines.

Fake Email

Overview: Since SMTP does not authenticate the sender of an email, a hacker can forge an email to your internal customers, claiming to be from someone they know and know. Believers, and come with an installable Trojan horse, or a link to a malicious website.

Defense: Use security tools like PGP and install email certificates.

The above is the detailed content of What are the 4 main types of cyber attacks?. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to change network type to private or public in Windows 11 How to change network type to private or public in Windows 11 Aug 24, 2023 pm 12:37 PM

Setting up a wireless network is common, but choosing or changing the network type can be confusing, especially if you don't know the consequences. If you're looking for advice on how to change the network type from public to private or vice versa in Windows 11, read on for some helpful information. What are the different network profiles in Windows 11? Windows 11 comes with a number of network profiles, which are essentially sets of settings that can be used to configure various network connections. This is useful if you have multiple connections at home or office so you don't have to set it all up every time you connect to a new network. Private and public network profiles are two common types in Windows 11, but generally

Implementing dynamic arrays in Python: from beginner to proficient Implementing dynamic arrays in Python: from beginner to proficient Apr 21, 2023 pm 12:04 PM

Part 1 Let’s talk about the nature of Python sequence types. In this blog, let’s talk about Python’s various “sequence” classes and the three built-in commonly used data structures – list, tuple and character. The nature of the string class (str). I don’t know if you have noticed it, but these classes have an obvious commonality. They can be used to save multiple data elements. The most important function is: each class supports subscript (index) access to the elements of the sequence, such as using SyntaxSeq[i]​. In fact, each of the above classes is represented by a simple data structure such as an array. However, readers familiar with Python may know that these three data structures have some differences: for example, tuples and strings cannot be modified, while lists can.

How to create a video matrix account? What types of matrix accounts do it have? How to create a video matrix account? What types of matrix accounts do it have? Mar 21, 2024 pm 04:57 PM

With the popularity of short video platforms, video matrix account marketing has become an emerging marketing method. By creating and managing multiple accounts on different platforms, businesses and individuals can achieve goals such as brand promotion, fan growth, and product sales. This article will discuss how to effectively use video matrix accounts and introduce different types of video matrix accounts. 1. How to create a video matrix account? To make a good video matrix account, you need to follow the following steps: First, you must clarify what the goal of your video matrix account is, whether it is for brand communication, fan growth or product sales. Having clear goals helps develop strategies accordingly. 2. Choose a platform: Choose an appropriate short video platform based on your target audience. The current mainstream short video platforms include Douyin, Kuaishou, Huoshan Video, etc.

Japan's JAXA apologizes for leaking partner information due to cyber attack Japan's JAXA apologizes for leaking partner information due to cyber attack Jul 10, 2024 pm 02:57 PM

According to news from this website on July 5, the Japan Aerospace Exploration Agency (JAXA) issued an announcement today, confirming that the cyber attack suffered last year led to the leakage of information, and apologized to relevant units for this. JAXA stated that the information leaked this time includes not only the internal information of the agency, but also information related to joint operations with external organizations and personal information. JAXA believes that "this matter may damage the relationship of trust", but will not provide it due to the relationship with the other party. details. In this regard, JAXA has apologized to the individuals and related parties who leaked the information and notified them one by one. As of now, JAXA has not received any reports of any significant impact on the business activities of relevant personnel, but they deeply apologize for any inconvenience caused and apologize again. This site noticed that JA

What is the type of return value of Golang function? What is the type of return value of Golang function? Apr 13, 2024 pm 05:42 PM

Go functions can return multiple values ​​of different types. The return value type is specified in the function signature and returned through the return statement. For example, a function can return an integer and a string: funcgetDetails()(int,string). In practice, a function that calculates the area of ​​a circle can return the area and an optional error: funccircleArea(radiusfloat64)(float64,error). Note: If the function signature does not specify a type, a null value is returned; it is recommended to use a return statement with an explicit type declaration to improve readability.

Best practices for type hints in Python Best practices for type hints in Python Apr 23, 2023 am 09:28 AM

It’s great to use dynamic language for a while, and the code is reconstructed in the crematorium. I believe you must have heard this sentence. Like unit testing, although it takes a small amount of time to write code, it is very worthwhile in the long run. This article shares how to better understand and use Python's type hints. 1. Type hints are only valid at the syntax level. Type hints (introduced since PEP3107) are used to add types to variables, parameters, function parameters, and their return values, class properties, and methods. Python's variable types are dynamic and can be modified at runtime to add type hints to the code. It is only supported at the syntax level and has no impact on the running of the code. The Python interpreter will ignore the type hints when running the code. Therefore the type

C++ function types and characteristics C++ function types and characteristics Apr 11, 2024 pm 03:30 PM

C++ functions have the following types: simple functions, const functions, static functions, and virtual functions; features include: inline functions, default parameters, reference returns, and overloaded functions. For example, the calculateArea function uses π to calculate the area of ​​a circle of a given radius and returns it as output.

What are the main self-media platforms? What are the types of self-media platforms? What are the main self-media platforms? What are the types of self-media platforms? Mar 21, 2024 pm 06:36 PM

With the rapid development of the Internet, self-media has become an important channel for information dissemination. We-media platforms provide a stage for individuals and companies to showcase themselves and spread information. Currently, the main self-media platforms on the market include WeChat official accounts, Toutiao, Yidian News, Penguin Media Platform, etc. Each of these platforms has its own characteristics and provides a wealth of creative space for the majority of self-media practitioners. Next, we will introduce these platforms in detail and explore the types of self-media platforms. 1. What are the main self-media platforms? WeChat official account is a self-media platform launched by Tencent to provide information release and dissemination services for individual and corporate users. It is divided into two types: service account and subscription account. Service account mainly provides services for enterprises, while subscription account focuses on information dissemination. Depend on