Angriffsmethoden: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
| Zeile 1: | Zeile 1: | ||
| + | == Klassische Angriffe == | ||
*[[Exploits]] | *[[Exploits]] | ||
*[[Bufferoverflow]] | *[[Bufferoverflow]] | ||
*[[Rootkits]] | *[[Rootkits]] | ||
*[[Dos/DDos]] | *[[Dos/DDos]] | ||
| + | |||
| + | == Netzwerkbasierte Angriffe == | ||
*[[Sniffer]] | *[[Sniffer]] | ||
*[[Replay-Attacken]] | *[[Replay-Attacken]] | ||
*[[TCP/IP Session-Hijacking]] | *[[TCP/IP Session-Hijacking]] | ||
*[[Arp Spoofing]] | *[[Arp Spoofing]] | ||
| + | *[[DNS Spoofing]] | ||
| + | *[[Man-in-the-Middle]] | ||
| + | *[[ICMP Redirect Attacks]] | ||
| + | *[[VLAN Hopping]] | ||
| + | |||
| + | == Informationsgewinnung == | ||
| + | *[[Footprinting]] | ||
| + | *[[Scanning]] | ||
| + | *[[Enumeration]] | ||
| + | |||
| + | == Webangriffe == | ||
| + | *[[SQL Injection]] | ||
| + | *[[Cross-Site Scripting (XSS)]] | ||
| + | *[[Command Injection]] | ||
| + | *[[Directory Traversal]] | ||
| + | *[[Cross-Site Request Forgery (CSRF)]] | ||
| + | |||
| + | == Authentifizierungs- und Identitätsangriffe == | ||
| + | *[[Password Attacks]] | ||
| + | *[[Credential Stuffing]] | ||
| + | *[[Pass-the-Hash]] | ||
| + | *[[Pass-the-Ticket]] | ||
| + | *[[Kerberoasting]] | ||
| + | |||
| + | == Malware & | ||
| + | Schadsoftware == | ||
| + | *[[Trojaner]] | ||
| + | *[[Würmer]] | ||
| + | *[[Viren]] | ||
| + | *[[Ransomware]] | ||
| + | |||
| + | == Wireless-Angriffe == | ||
| + | *[[Evil Twin]] | ||
| + | *[[Deauthentication Attack]] | ||
| + | *[[WPA-Handshakes und Cracking]] | ||
| + | |||
| + | == Social Engineering == | ||
| + | *[[Phishing]] | ||
| + | *[[Spear Phishing]] | ||
| + | *[[Pretexting]] | ||
Version vom 25. November 2025, 16:35 Uhr
Klassische Angriffe
Netzwerkbasierte Angriffe
- Sniffer
- Replay-Attacken
- TCP/IP Session-Hijacking
- Arp Spoofing
- DNS Spoofing
- Man-in-the-Middle
- ICMP Redirect Attacks
- VLAN Hopping
Informationsgewinnung
Webangriffe
- SQL Injection
- Cross-Site Scripting (XSS)
- Command Injection
- Directory Traversal
- Cross-Site Request Forgery (CSRF)
Authentifizierungs- und Identitätsangriffe
== Malware & Schadsoftware ==