0% found this document useful (0 votes)
20 views3 pages

File

This document contains descriptions of various cybersecurity threats and attacks, including malware, exploits, denial of service attacks, privilege escalation, password leaks, and web application attacks. The majority of the entries refer to malware, network attacks, privilege gain, scans, and web attacks. A wide range of threats are covered, from botnets and backdoors to SQL injection, man-in-the-middle attacks, and remote code execution.

Uploaded by

yohanesderese04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views3 pages

File

This document contains descriptions of various cybersecurity threats and attacks, including malware, exploits, denial of service attacks, privilege escalation, password leaks, and web application attacks. The majority of the entries refer to malware, network attacks, privilege gain, scans, and web attacks. A wide range of threats are covered, from botnets and backdoors to SQL injection, man-in-the-middle attacks, and remote code execution.

Uploaded by

yohanesderese04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

A Command-And-Control [C&C] Server: Command and Control - C2

Adminstartor Privilage Gain: Administrator Privilege Gain


Administrator Privilege Gain: Administrator Privilege Gain
Administer Privilege Gain: Administrator Privilege Gain
Adware: Adware
A Network Trojan: Network Trojan
A Network Trojan Was Detected: Network Trojan
Apache Log4J Rce Attempt: Apache Log4J Attack
Attempted Administrator Privilege Gain: Administrator Privilege Gain
Attempt To Information Leak: Information Leak
Attempted User Privilege Gain: Administrator Privilege Gain
Attempted Information Leak: Information Leak
Attampted Adminstration Privilage Gain: Administrator Privilege Gain
Attempted Gain Adminstartion Privilage: Administrator Privilege Gain
Attempt To Use Privilage Gain: Administrator Privilege Gain
Attempted Denial Of Service: Denial of Service
Backdoors: Backdoor
Botnet: Botnet
Bots: Botnet
Brute-Force Attack: Brute-Force
Brute Force: Brute-Force
Bypass: Bypass
Bypass Attempt: Bypass
C2 Detected: Command and Control - C2
Code Injection: Code Injection
Collision Attack: Collision Attack
Command Excuttion Attempt: Command Execution
Command Execution: Command Execution
Contains Pwd= In Cleartext: Password in Cleartext
Cross Site Scripting Attempt: Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS): Cross-Site Scripting (XSS)
Cryptojacking: Cryptojacking
Cve-2021-44228 Exploitation Attacks: Exploit/Bypass
Ddos: Distributed Denial-of-Service
Distributed Denial-of-Service (DDoS): Distributed Denial-of-Service
Domain Name Server (DNS) spoofing: Domain Name Server (DNS) Spoofing
DNS Tunneling: DNS Tunneling
Domain Observed Used For C2 Detected: Command and Control - C2
Denial-of-Service (DoS): Denial of Service
Dos Attempt: Denial of Service
Dos: Denial of Service
Eavesdropping: Eavesdropping
Emotet: Emotet
Etc Trickbot Command And Control: Command and Control - C2
Et Scan Potential Ssh Scan Outbound: Potential SSH Scan Outbound
Exploit: Exploit/Bypass
Exploit/Bypass: Exploit/Bypass
Exploit And Remote Shell Excution: Exploit/Bypass
Http Code Poisoning: HTTP Code Poisoning
Http Code Po Isoning /A Cross Site Scripting Att Ack: HTTP Code Poisoning
ICMP flood: ICMP Flood
Information Loss: Information Leak
Injection Attavck: Injection
Keylogger: Keylogger
Ldap Server Binding: LDAP Server Binding
Login Attempt: Login Attempt
Log4J Issue: Apache Log4J Attack
Login: Login Attempt
Majestic12: Botnet
Malware Command And Control Activity Detected: Command and Control - C2
Malware/Maliciou Scan: Malicious Scan
Malicious Code Attempt: Malicious Code Attempt
Malwre: Malware
Malware/Adware: Adware
Malware Command And Control Activity: Command and Control - C2
Malware Attempt: Malware
Malwrae: Malware
Malwa Re: Malware
Malicious: Malware
Malware(Malicious): Malware
Malwar: Malware
Malware Compromisation (Misc Attack): Malware Compromise
Malware: Malware
Man-in-the-Middle: Man-in-the-Middle
Misc Attack: Hostile Host Traffic
Mis Attack: Hostile Host Traffic
Network Attacks: Network Attack
Network: Network Attack
Network Trojan Was Detected: Network Trojan
Network Scan: Network Scan
Network Trojn Attacke: Network Trojan
Network Trojan: Network Trojan
OS command injection: OS Command Injection
Pass= In Clear Text: Password in Cleartext
Phishing: Phishing
Port Scan: Port Scan
Potentially Bad Traffic: Bad Traffic
Potential Corporate Privacy Violation: Privacy Violation
Privacy Violation: Privacy Violation
Privilege Gain: Privilege Gain
Protocol-Command-Decode: Protocol-Command-Decode
Ql Injection Attempt And Cross Site Scripting Attempt: SQL Injection
Ransomware: Ransomware
Rce Attempt: Remote Code Execution
Rce: Remote Code Execution
Rdp Attacks: Remote Code Execution
Rdp: Remote Code Execution
Remote Code Execution: Remote Code Execution
Saspicious Scan: Scan
Scanning: Scan
Scanning (Misc-Activity): Scan
Scann: Scan
Scan: Scan
Scan/Bypass: Scan/Bypass
Security By Pass Attempt: Bypass
Session Hijacking: Session Hijacking
Sha1 Hash: Malicious SSL Certificate
Shell Command: Shell Command Execution
Shell Command Execution Attempt: Shell Command Execution
Shell Command Execution: Shell Command Execution
Shell: Shell Command Execution
Shell Execution Attempt: Shell Command Execution
Spam: Spam
Spear-Phishing: Spear-Phishing
Spoofing: Spoofing
Spyware: Spyware
Sql Injection Attempt: SQL Injection
Sql Injection: SQL Injection
SQL Injection: SQL Injection
Sqli Attempt: SQL Injection
Ssh Scan: SSH Scan
SYN flood: SYN Flood
Trojan Horses: Trojan Horse
Trojan(Malware): Trojan Horse
Trojan: Trojan Horse
URL Interpretation: URL Interpretation
Watering Hole: Watering Hole
Web Aplication Attack: Web Application Attack
Web Application Attackweb Application Attack: Web Application Attack
Web Shel: Web Shell
Web Application Attack Attempted Administrator Privilege Gain: Web Server Attack
Web Attack: Web Attack
Webshell: Web Shell
Web Application Attack: Web Application Attack
Web Application Attack Attempt: Web Application Attack
Web Application Attack Scanning: Command and Control - C2
Web Server Attack: Web Server Attack
Web Server: Web Server Attack
Web/OS: Web Attack
Web App Attack: Web Application Attack
Webpplication: Web Application Attack
Web Application Atack: Web Application Attack
Web_Se Rver: Web Server Attack
Web_Serv Er: Web Server Attack
Wget Http - Post: Web Attack
Whale-Phishing: Whale-Phishing
Worm: Worm
Xdmcp: XDMCP
Xss Attempt: XSS
Xxe: XXE

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy