List of hacking types you should be protecting your website / portal against – Part 1

Credits: www.Pixabay.com

Comprehensive List of Website Hacking Types (100+) sourced from ChatGPT

  1. SQL Injection
  2. Blind SQL Injection
  3. Boolean-Based SQL Injection
  4. Time-Based SQL Injection
  5. Error-Based SQL Injection
  6. Cross-Site Scripting (XSS)
  7. Reflected XSS
  8. Stored XSS
  9. DOM-Based XSS
  10. Cross-Site Request Forgery (CSRF)
  11. Clickjacking
  12. Remote File Inclusion (RFI)
  13. Local File Inclusion (LFI)
  14. Directory Traversal
  15. Session Hijacking
  16. DNS Spoofing
  17. Man-in-the-Middle (MITM) Attack
  18. Brute Force Attack
  19. Credential Stuffing
  20. Dictionary Attack
  21. Code Injection
  22. Command Injection
  23. XML External Entities (XXE)
  24. HTTP Host Header Attack
  25. Broken Authentication
  26. Sensitive Data Exposure
  27. Security Misconfiguration
  28. Insecure Deserialization
  29. Server-Side Request Forgery (SSRF)
  30. Denial of Service (DoS)
  31. Distributed Denial of Service (DDoS)
  32. Path Manipulation
  33. Subdomain Takeover
  34. Open Redirect
  35. Cache Poisoning
  36. Business Logic Attack
  37. Social Engineering
  38. Zero-Day Exploit
  39. Exploit Kits
  40. Malware Injection
  41. Web Shell Attack
  42. Phishing
  43. Spear Phishing
  44. Whaling
  45. Content Spoofing
  46. Parameter Tampering
  47. URL Manipulation
  48. Cookie Poisoning
  49. HTTP Response Splitting
  50. Broken Access Control
  51. API Abuse
  52. Side-Channel Attack
  53. Supply Chain Attack
  54. CSP Bypass (Content Security Policy Bypass)
  55. OAuth Misconfiguration
  56. DOM-Based XSS
  57. Web Cache Deception
  58. CRLF Injection
  59. Eavesdropping
  60. Remote Code Execution (RCE)
  61. Privilege Escalation
  62. SQL Truncation Attack
  63. Timing Attack
  64. Padding Oracle Attack
  65. Credential Harvesting
  66. Session Fixation
  67. URL Redirection Attack
  68. HTTP Parameter Pollution (HPP)
  69. Race Condition
  70. Slowloris Attack
  71. DNS Amplification Attack
  72. Smurf Attack
  73. Ping of Death
  74. SYN Flood
  75. TCP Hijacking
  76. ICMP Flood
  77. ARP Spoofing
  78. Email Spoofing
  79. Typosquatting
  80. Watering Hole Attack
  81. Malvertising
  82. Click Fraud
  83. Cookie Injection
  84. Cookie Theft
  85. Cookie Tampering
  86. DNS Cache Poisoning
  87. Command and Control (C2) Attack
  88. Keylogging
  89. Credential Reuse Attack
  90. Watermarking Attack
  91. Image-Based Attack (Steganography)
  92. WebRTC Leak
  93. Host Header Injection
  94. Token Hijacking
  95. Hidden Field Manipulation
  96. Bypassing Input Validation
  97. Null Byte Injection
  98. File Upload Vulnerability
  99. Cross-Origin Resource Sharing (CORS) Exploit
  100. Cross-Origin Request Attack (COR)
  101. Security Token Exposure
  102. HTML Injection
  103. Frame Injection
  104. Tabnabbing
  105. DNS Rebinding
  106. HTTP Smuggling
  107. HTTP Desync Attack
  108. SSL Stripping
  109. TLS Downgrade Attack
  110. JavaScript Injection
  111. Python Code Injection
  112. Bash Injection
  113. Shellshock Attack
  114. Path Traversal
  115. Symlink Attack
  116. Broken Function Level Authorization
  117. DNS Tunneling
  118. WebSocket Injection
  119. Parameter Pollution
  120. Java Deserialization Attack
  121. PHP Object Injection
  122. Command Injection via Environment Variables
  123. Header Injection
  124. RegEx Injection
  125. Server-Side Template Injection (SSTI)
  126. PHP Code Injection
  127. DOM Clobbering
  128. Prototype Pollution
  129. Buffer Overflow
  130. Heap Overflow
  131. Stack Overflow
  132. Heap Spray Attack
  133. Session Replay Attack
  134. Token Replay Attack
  135. Referrer Leakage
  136. Weak Password Attack
  137. Content Injection
  138. Response Tampering
  139. Email Injection
  140. Path Manipulation Attack
  141. JSON Injection
  142. LDAP Injection
  143. XPath Injection
  144. iFrame Injection
  145. Process Injection
  146. Memory Corruption
  147. Cross-Site History Manipulation
  148. Drive-by Download Attack
  149. Command Injection via Shell
  150. Exposed Debug Endpoint
  151. Rate Limiting Bypass
  152. Anti-Automation Bypass
  153. Automated Scanner Detection Bypass
  154. WAF Bypass (Web Application Firewall)
  155. Websocket Abuse
  156. Multi-Factor Authentication (MFA) Bypass
  157. Sensitive File Exposure
  158. Default Credentials Exploit
  159. Hidden Admin Panel Detection
  160. Deprecated API Exploit
  161. Weak CAPTCHA Protection
  162. Insufficient Logging and Monitoring
  163. Excessive Data Exposure
  164. Improper Error Handling
  165. Full Path Disclosure
  166. WebRTC Exploit
  167. Content Spoofing in HTML Emails
  168. Vulnerable JavaScript Libraries
  169. Browser Fingerprinting
  170. Remote Desktop Exploit
  171. SAML Injection
  172. JWT Token Forgery
  173. Firebase Misconfiguration
  174. Server Misconfiguration
  175. Third-Party Script Exploits

By Neil Harwani

Interested in movies, music, history, computer science, software, engineering and technology

Leave a comment