ALERT

[LAST CHANCE] Data Layer: Modern Business, Defined

Mode of Attack

Definition - What does Mode of Attack mean?

A mode of attack is a method by which hackers seek to access a system. Hackers exploit system vulnerabilities in order to damage data or interrupt computer functions through code manipulation or by injecting new malicious code.

Modes of attack include:

  • Email attachments
  • Buffer overflow
  • Security software
  • Updating processes and associated software
  • SQL vulnerabilities
  • Network protection software

There are many other modes of attack, but these are the most potentially destructive.

A mode of attack may also be called a method of attack.

Techopedia explains Mode of Attack

The following are historical examples of damaging viruses and their modes of attack:

  • Morris 1988: Exploited email client flaws in Unix Sendmail.
  • Melissa 1999: Forced the shutdown of email gateways by generating excess traffic.
  • VBS/Loveletter 2000: Exploited email address lists and sent large numbers of messages.
  • Code Red 2001: Exploited a buffer overflow and damaged connectivity.
  • Nimda 2001: Generated masses of email to transmit itself, lured users to an infected website and exploited issues with security software.
  • SQL Slammer 2003: Exploited buffer-overflow bug and distributed copies of itself worldwide, causing service denials and Internet slowdown.
  • MS Blaster 2003: Exploited MS windowsupdate.com, causing major denial-of-service attacks and forcing computer restarts for banks, city governments and thousands of home and corporate users.
  • MyDoom 2004: A virus spread via email attachment. The virus spread when the attachment was opened and exploited address book lists. It also exploited the Kazaa file-sharing service.
  • Sasser 2004: Exploited buffer-overflow and affected transportation. Delta canceled 40 trans-Atlantic flights and Australian trains were forced to halt operations.
  • Witty 2004: Exploited network vulnerabilities by attacking network-protection software. It overwrote hard disks, rendering them unusable.

Techopedia Deals

Connect with us

Techopedia on Linkedin
Techopedia on Linkedin
Tweat cdn.techopedia.com
"Techopedia" on Twitter


'@Techopedia'
Sign up for Techopedia's Free Newsletter!

Email Newsletter

Join thousands of others with our weekly newsletter

Resources
The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.