[TIME RUNNING OUT] Discovery & Management Across the Database Environment

Mode of Attack

Definition - What does Mode of Attack mean?

A mode of attack is a method by which hackers seek to access a system. Hackers exploit system vulnerabilities in order to damage data or interrupt computer functions through code manipulation or by injecting new malicious code.

Modes of attack include:

  • Email attachments
  • Buffer overflow
  • Security software
  • Updating processes and associated software
  • SQL vulnerabilities
  • Network protection software

There are many other modes of attack, but these are the most potentially destructive.

A mode of attack may also be called a method of attack.

Techopedia explains Mode of Attack

The following are historical examples of damaging viruses and their modes of attack:

  • Morris 1988: Exploited email client flaws in Unix Sendmail.
  • Melissa 1999: Forced the shutdown of email gateways by generating excess traffic.
  • VBS/Loveletter 2000: Exploited email address lists and sent large numbers of messages.
  • Code Red 2001: Exploited a buffer overflow and damaged connectivity.
  • Nimda 2001: Generated masses of email to transmit itself, lured users to an infected website and exploited issues with security software.
  • SQL Slammer 2003: Exploited buffer-overflow bug and distributed copies of itself worldwide, causing service denials and Internet slowdown.
  • MS Blaster 2003: Exploited MS, causing major denial-of-service attacks and forcing computer restarts for banks, city governments and thousands of home and corporate users.
  • MyDoom 2004: A virus spread via email attachment. The virus spread when the attachment was opened and exploited address book lists. It also exploited the Kazaa file-sharing service.
  • Sasser 2004: Exploited buffer-overflow and affected transportation. Delta canceled 40 trans-Atlantic flights and Australian trains were forced to halt operations.
  • Witty 2004: Exploited network vulnerabilities by attacking network-protection software. It overwrote hard disks, rendering them unusable.
Share this:

Techopedia Deals

Connect with us

Techopedia on Linkedin
Techopedia on Linkedin
"Techopedia" on Twitter

Sign up for Techopedia's Free Newsletter!

Email Newsletter

Join thousands of others with our weekly newsletter

The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.