โ๏ธ
Attack Types Cheat Sheet
Cyber attack types, methods, and prevention techniques
| Attack | Category | Target | Method | Prevention |
|---|---|---|---|---|
| Phishing | Social Engineering | Users | Fraudulent emails/sites | Training, email filters |
| Spear Phishing | Social Engineering | Specific individuals | Personalized phishing | MFA, awareness training |
| Whaling | Social Engineering | Executives | High-value phishing | Verification procedures |
| Vishing | Social Engineering | Phone users | Voice phishing calls | Call verification |
| Smishing | Social Engineering | Mobile users | SMS phishing | Link verification |
| DDoS | Network | Servers/Networks | Traffic flooding | CDN, rate limiting |
| DoS | Network | Single target | Resource exhaustion | Firewalls, IPS |
| Man-in-the-Middle | Network | Communications | Intercept traffic | TLS, certificate pinning |
| DNS Spoofing | Network | DNS resolution | Fake DNS responses | DNSSEC |
| ARP Poisoning | Network | Local network | Fake ARP replies | Static ARP, DAI |
| SQL Injection | Web | Databases | Malicious SQL queries | Parameterized queries |
| XSS | Web | Web browsers | Inject malicious scripts | Input sanitization, CSP |
| CSRF | Web | Authenticated users | Forged requests | CSRF tokens |
| Buffer Overflow | Application | Memory | Exceed buffer bounds | ASLR, DEP, safe coding |
| Ransomware | Malware | Files/Systems | Encrypt and extort | Backups, EDR, patching |
| Trojan | Malware | Systems | Disguised as legitimate | Antivirus, app whitelisting |
| Rootkit | Malware | OS kernel | Hide malicious activity | Secure boot, integrity checks |
| Keylogger | Malware | Keyboards | Record keystrokes | Anti-malware, virtual keyboards |
| Brute Force | Password | Authentication | Try all combinations | Account lockout, MFA |
| Password Spraying | Password | Multiple accounts | Common passwords | Password policies, MFA |
| Credential Stuffing | Password | Breached credentials | Reuse stolen logins | MFA, breach monitoring |
| Zero-Day | Exploit | Unpatched systems | Unknown vulnerability | Defense in depth, EDR |
| Privilege Escalation | Exploit | Permissions | Gain higher access | Least privilege, patching |
| Supply Chain Attack | Advanced | Software/Hardware | Compromise vendors | Vendor vetting, SBOMs |