Types of Attacks
Understanding Cyber Threats
Know Your Enemy to Build Better Defenses
Cyber Attack Overview
Cyber Attack is a malicious attempt to damage, disrupt, or gain unauthorized access to computer systems, networks, or digital devices.
Why Understanding Attacks Matters:
- Proactive Defense: Know what you're defending against
- Risk Assessment: Understand threat landscape
- Security Planning: Design appropriate countermeasures
- Incident Response: Quickly identify attack types
- Awareness Training: Educate users about threats
Attack Classification
By Target:
- Network attacks
- System attacks
- Application attacks
- Data attacks
By Method:
- Technical attacks
- Social engineering
- Physical attacks
- Insider threats
By Impact:
- Passive: Monitoring, eavesdropping (CIA: Confidentiality)
- Active: Modification, disruption (CIA: Integrity, Availability)
- Destructive: Permanent damage, data loss
Brute Force Attack
Brute Force Attack: Systematic attempt to crack passwords, encryption keys, or access credentials by trying all possible combinations.
Password Brute Force Example:
Target: 4-digit PIN (0000-9999)
Attempts: 0000, 0001, 0002, 0003, ... 9999
Maximum attempts needed: 10,000
Average attempts: 5,000
Time Estimates:
100 attempts/second: Up to 100 seconds
1,000 attempts/second: Up to 10 seconds
Complex Password (8 chars, mixed case, numbers, symbols):
Possible combinations: ~95^8 = 6.6 quintillion
Time at 1 billion attempts/second: ~200 years
Target: 4-digit PIN (0000-9999)
Attempts: 0000, 0001, 0002, 0003, ... 9999
Maximum attempts needed: 10,000
Average attempts: 5,000
Time Estimates:
100 attempts/second: Up to 100 seconds
1,000 attempts/second: Up to 10 seconds
Complex Password (8 chars, mixed case, numbers, symbols):
Possible combinations: ~95^8 = 6.6 quintillion
Time at 1 billion attempts/second: ~200 years
Brute Force Attack Variations
- Dictionary Attack: Uses common passwords and words
- Hybrid Attack: Dictionary words with number/symbol variations
- Rainbow Table Attack: Precomputed hash lookups
- Credential Stuffing: Uses known username/password pairs
- Password Spraying: Common passwords across many accounts
Countermeasures:
- Account lockout policies
- Rate limiting and delays
- Strong password requirements
- Multi-factor authentication
- CAPTCHA implementation
Credential Stuffing Attack
Credential Stuffing: Using stolen username/password pairs from data breaches to gain unauthorized access to other accounts.
Attack Process:
1. Attacker obtains breach data (millions of credentials)
2. Automated tools test credentials across multiple sites
3. Exploits password reuse habits
4. Successfully accesses accounts using same credentials
Real Example:
LinkedIn breach (2012) → Credentials used to attack:
• Banking sites
• E-commerce platforms
• Social media accounts
• Email services
1. Attacker obtains breach data (millions of credentials)
2. Automated tools test credentials across multiple sites
3. Exploits password reuse habits
4. Successfully accesses accounts using same credentials
Real Example:
LinkedIn breach (2012) → Credentials used to attack:
• Banking sites
• E-commerce platforms
• Social media accounts
• Email services
Why It Works: 65% of people reuse passwords across multiple accounts
Social Engineering Attack
Social Engineering: Psychological manipulation of people to divulge confidential information or perform actions that compromise security.
Common Techniques:
- Pretexting: Creating false scenarios to gain trust
- Baiting: Offering something enticing to trigger curiosity
- Scareware: Using fear to prompt immediate action
- Quid Pro Quo: Offering services in exchange for information
- Tailgating: Following authorized personnel into secure areas
- Authority Impersonation: Posing as executives or IT personnel
Success Rate: 98% of cyber attacks rely on social engineering
Phishing Attack
Phishing: Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communications.
Typical Phishing Email:
From: security@yourbank.com (fake address)
Subject: "Urgent: Account Security Alert"
"Your account has been compromised. Click here
immediately to verify your identity and secure
your account: http://fake-bank-site.com
Failure to act within 24 hours will result
in account suspension."
Red Flags:
• Urgency and fear tactics
• Suspicious URL
• Generic greetings
• Requests for sensitive information
From: security@yourbank.com (fake address)
Subject: "Urgent: Account Security Alert"
"Your account has been compromised. Click here
immediately to verify your identity and secure
your account: http://fake-bank-site.com
Failure to act within 24 hours will result
in account suspension."
Red Flags:
• Urgency and fear tactics
• Suspicious URL
• Generic greetings
• Requests for sensitive information
Phishing Attack Variations
- Spear Phishing: Targeted at specific individuals or organizations
- Whaling: Targeting high-profile executives
- Clone Phishing: Legitimate email replicated with malicious links
- Pharming: Redirecting users to fake websites
- Smishing: Phishing via SMS/text messages
- Vishing: Voice phishing through phone calls
Protection Strategies:
- Email security filters
- User awareness training
- URL verification
- Multi-factor authentication
- Regular security updates
Vishing (Voice Phishing)
Vishing: Voice-based phishing attack using phone calls to trick victims into revealing sensitive information.
Common Vishing Scenarios:
Bank Impersonation:
"Hello, this is John from your bank's fraud department.
We've detected suspicious activity on your account.
I need to verify your identity. Can you provide
your account number and PIN?"
IT Support Scam:
"This is Microsoft technical support. Your computer
has been infected with malware. Please give me
remote access to fix the problem immediately."
Government Impersonation:
"This is the IRS. You owe back taxes and face
immediate arrest unless you pay with gift cards."
Bank Impersonation:
"Hello, this is John from your bank's fraud department.
We've detected suspicious activity on your account.
I need to verify your identity. Can you provide
your account number and PIN?"
IT Support Scam:
"This is Microsoft technical support. Your computer
has been infected with malware. Please give me
remote access to fix the problem immediately."
Government Impersonation:
"This is the IRS. You owe back taxes and face
immediate arrest unless you pay with gift cards."
Vishing Attack Techniques
Vishing Tactics:
- Caller ID Spoofing: Displaying fake phone numbers
- Authority Impersonation: Posing as banks, government, IT support
- Urgency Creation: "Act now or face consequences"
- Information Gathering: Building trust with known details
- Emotional Manipulation: Fear, greed, or helpfulness
- Technical Jargon: Using complex terms to sound legitimate
Vishing Prevention:
- Never give sensitive information over unsolicited calls
- Verify caller identity through official channels
- Be suspicious of urgent requests
- Use call blocking and screening
- Report suspicious calls to authorities
Man-in-the-Middle (MitM) Attack
Man-in-the-Middle Attack: Intercepting communications between two parties without their knowledge to eavesdrop or alter messages.
MitM Attack Process:
Normal Communication:
Alice ←→ Bob
MitM Attack:
Alice ←→ Attacker ←→ Bob
1. Attacker intercepts Alice's message to Bob
2. Attacker can read, modify, or replace message
3. Attacker forwards (possibly modified) message to Bob
4. Bob's response follows same path in reverse
5. Neither Alice nor Bob knows about interception
Normal Communication:
Alice ←→ Bob
MitM Attack:
Alice ←→ Attacker ←→ Bob
1. Attacker intercepts Alice's message to Bob
2. Attacker can read, modify, or replace message
3. Attacker forwards (possibly modified) message to Bob
4. Bob's response follows same path in reverse
5. Neither Alice nor Bob knows about interception
MitM Attack Variations
- WiFi Eavesdropping: Monitoring unencrypted WiFi traffic
- Evil Twin: Fake WiFi access points
- SSL Hijacking: Intercepting HTTPS connections
- DNS Spoofing: Redirecting domain name resolutions
- ARP Poisoning: Manipulating network routing tables
- BGP Hijacking: Internet routing manipulation
MitM Countermeasures:
- End-to-end encryption
- Certificate verification
- VPN usage on public networks
- HTTPS enforcement
- Network monitoring
Attack Statistics & Trends
| Attack Type | Success Rate | Average Time | Primary Target |
|---|---|---|---|
| Phishing | 3.4% | Immediate | Credentials |
| Spear Phishing | 70% | Days-Weeks | Specific targets |
| Brute Force | 5% | Minutes-Years | Weak passwords |
| Credential Stuffing | 0.1-2% | Seconds | Reused passwords |
| Social Engineering | 98% | Variable | Human psychology |
Comprehensive Attack Prevention
Technical Controls:
- Multi-factor authentication
- Account lockout policies
- Network monitoring and filtering
- Encryption and secure protocols
- Regular security updates
Administrative Controls:
- Security awareness training
- Incident response procedures
- Security policies and guidelines
- Regular security assessments
- Vendor security requirements
Emerging Attack Trends
- AI-Powered Attacks: Machine learning for social engineering
- Deepfake Technology: Sophisticated video/audio impersonation
- IoT-Based Attacks: Exploiting connected devices
- Supply Chain Attacks: Compromising third-party vendors
- Cloud-Specific Attacks: Exploiting cloud misconfigurations
- Mobile-First Attacks: Targeting smartphone users
- Quantum Computing Threats: Breaking current encryption
Typical Attack Lifecycle
Cyber Kill Chain:
1. Reconnaissance: Gathering target information
2. Weaponization: Creating attack tools
3. Delivery: Transmitting weapon to target
4. Exploitation: Triggering vulnerability
5. Installation: Installing malware/backdoor
6. Command & Control: Establishing communication
7. Actions on Objective: Achieving attack goals
Defense Strategy: Break the chain at any stage
1. Reconnaissance: Gathering target information
2. Weaponization: Creating attack tools
3. Delivery: Transmitting weapon to target
4. Exploitation: Triggering vulnerability
5. Installation: Installing malware/backdoor
6. Command & Control: Establishing communication
7. Actions on Objective: Achieving attack goals
Defense Strategy: Break the chain at any stage
Attack Detection & Response
Detection Methods:
- Behavioral analysis and anomaly detection
- Network traffic monitoring
- Log analysis and correlation
- User activity monitoring
- Threat intelligence integration
Response Procedures:
- Incident identification and classification
- Containment and isolation
- Evidence collection and analysis
- System recovery and restoration
- Lessons learned and improvement
Key Takeaways
- Attacks exploit both technical vulnerabilities and human psychology
- Social engineering remains highly effective across all attack types
- Prevention requires both technical and administrative controls
- User education and awareness are critical defense components
- Multi-layered security approach provides best protection
- Continuous monitoring and response capabilities are essential
- Attack methods constantly evolve with new technologies
Remember: The best defense is understanding your enemy and preparing accordingly
Thank You
Questions & Discussion
Next Unit: Network & System Security

