A DNS Cache Poisoning attack works by tricking a DNS server into accepting a fake DNS record that will point you to a compromised DNS server.
A man-in-the-middle attack, is an attack that places the attacker in the middle of two hosts that think they're communicating directly with each other.
Rogue AP
A rogue AP is an access point that is installed on the network without the network administrator's knowledge.
Evil Twin
The premise of an evil twin attack is for you to connect to a network that is identical to yours. This identical network is our networks evil twin and is controlled by our attacker.
A Denial-of-Service, or DoS attack, is an attack that tries to prevent access to a service for legitimate users by overwhelming the network or server.
It works by sending a malformed ping to a computer.
The ping would be larger in size than what the internet protocol was made to handle. So it results in a buffer overflow.
Sends tons of ping packets to a system.
More specifically, it sends ICMP echo requests, since a ping expects an equal number of ICMP echo replies.
The server is being bombarded with the SYN packets. The server is sending back SYN-ACK packets but the attacker is not sending ack messages.'
DDoS attacks need a large volume of systems to carry out an attack and they're usually helped by botnet attackers.
A common security exploit that can occur in software development and runs rampant on the web is the possibility for an attacker to inject malicious code.
Social Enginnering
Social engineering is an attack method that relies heavily on interactions with humans instead of computers.
Phishing Attack
Phishing usually occurs when a malicious email is sent to a victim disguised as something legitimate.
Spearfishing
spearfishing specifically targets individual or group.
E-mail Spoofing
Baiting
Tailgating