Angriffsmethoden: Unterschied zwischen den Versionen

Aus Xinux Wiki
Zur Navigation springen Zur Suche springen
Zeile 1: Zeile 1:
 +
== Klassische Angriffe ==
 
*[[Exploits]]
 
*[[Exploits]]
 
*[[Bufferoverflow]]
 
*[[Bufferoverflow]]
 
*[[Rootkits]]
 
*[[Rootkits]]
 
*[[Dos/DDos]]
 
*[[Dos/DDos]]
 +
 +
== Netzwerkbasierte Angriffe ==
 
*[[Sniffer]]
 
*[[Sniffer]]
 
*[[Replay-Attacken]]
 
*[[Replay-Attacken]]
 
*[[TCP/IP Session-Hijacking]]
 
*[[TCP/IP Session-Hijacking]]
 
*[[Arp Spoofing]]
 
*[[Arp Spoofing]]
 +
*[[DNS Spoofing]]
 +
*[[Man-in-the-Middle]]
 +
*[[ICMP Redirect Attacks]]
 +
*[[VLAN Hopping]]
 +
 +
== Informationsgewinnung ==
 +
*[[Footprinting]]
 +
*[[Scanning]]
 +
*[[Enumeration]]
 +
 +
== Webangriffe ==
 +
*[[SQL Injection]]
 +
*[[Cross-Site Scripting (XSS)]]
 +
*[[Command Injection]]
 +
*[[Directory Traversal]]
 +
*[[Cross-Site Request Forgery (CSRF)]]
 +
 +
== Authentifizierungs- und Identitätsangriffe ==
 +
*[[Password Attacks]]
 +
*[[Credential Stuffing]]
 +
*[[Pass-the-Hash]]
 +
*[[Pass-the-Ticket]]
 +
*[[Kerberoasting]]
 +
 +
== Malware &
 +
Schadsoftware ==
 +
*[[Trojaner]]
 +
*[[Würmer]]
 +
*[[Viren]]
 +
*[[Ransomware]]
 +
 +
== Wireless-Angriffe ==
 +
*[[Evil Twin]]
 +
*[[Deauthentication Attack]]
 +
*[[WPA-Handshakes und Cracking]]
 +
 +
== Social Engineering ==
 +
*[[Phishing]]
 +
*[[Spear Phishing]]
 +
*[[Pretexting]]

Version vom 25. November 2025, 16:35 Uhr