โš ๏ธ Educational ยท Authorized Testing Only

Complete Hacking Attacks
Encyclopedia 2026

Every attack technique used by real hackers โ€” network, web, AI, social engineering, physical, cloud, mobile & more. 50+ attacks with simulations, defences & quizzes.

๐Ÿ’€ 50+ Attack Techniques ๐Ÿค– AI Attacks Included ๐Ÿ›ก๏ธ Defence Strategies ๐Ÿ’ป Live Simulations
50+Attack Types
12Categories
200+Techniques
50+Quiz Questions
๐Ÿ”
Filter:
๐Ÿ”Œ
Network Attacks
10 attacks
๐Ÿ’ฅ DoS / DDoS Attacks
๐Ÿ’ฅ

Overwhelm systems with massive traffic floods โ€” SYN flood, UDP flood, DNS amplification, HTTP slowloris. Botnet-powered DDoS takes down entire services.

Attack Complexity
โšก Medium ๐Ÿ’€ Critical ๐ŸŽฏ 85% rate โฑ 5-30min
๐ŸŽญ Man-in-the-Middle (MITM)
๐ŸŽญ

Position between communicating parties โ€” ARP spoofing, SSL stripping, HTTPS downgrade, evil twin WiFi. Intercept and modify all traffic in real-time.

Attack Complexity
โšก Hard ๐Ÿ’€ Critical ๐ŸŽฏ 70% rate โฑ 15-60min
๐Ÿ‘‚ Packet Sniffing
๐Ÿ‘‚

Passively capture network traffic with Wireshark, tcpdump, tshark. Extract credentials from HTTP, FTP, Telnet. Analyse protocols for vulnerabilities.

โšก Easy ๐Ÿ’€ High ๐ŸŽฏ 95% rate โฑ 2-15min
๐ŸŽช IP Spoofing
๐ŸŽช

Forge source IP addresses to bypass firewalls and ACLs, enable smurf attacks, bypass geo-restrictions, and hide attacker identity during reconnaissance.

โšก Easy ๐Ÿ’€ High ๐ŸŽฏ 90% rate โฑ 3-10min
๐Ÿ”„ ARP Poisoning / Spoofing
๐Ÿ”„

Corrupt ARP tables to redirect LAN traffic. Classic gateway impersonation with Ettercap/Arpspoof. Enables full MITM on local networks and credential theft.

โšก Medium ๐Ÿ’€ Critical ๐ŸŽฏ 88% rate โฑ 5-20min
๐ŸŒ DNS Attacks
๐ŸŒ

DNS cache poisoning, DNS hijacking, DNS tunnelling for C2, DNS amplification DDoS, NXDOMAIN attacks. Redirect victims to attacker-controlled infrastructure.

โšก Medium ๐Ÿ’€ Critical ๐ŸŽฏ 75% rate โฑ 10-45min
๐Ÿ›ฃ๏ธ BGP / Routing Attacks
๐Ÿ›ฃ๏ธ

BGP hijacking to reroute internet traffic globally, RIP route injection, OSPF poisoning. Nation-state level attacks that can redirect entire country's traffic.

โšก Expert ๐Ÿ’€ Critical ๐ŸŽฏ 45% rate โฑ 60-180min
โฎ๏ธ Replay Attacks
โฎ๏ธ

Capture and re-transmit authentication tokens, Kerberos tickets (Pass-the-Ticket), NTLM hashes (Pass-the-Hash), OAuth tokens for unauthorized access.

โšก Easy ๐Ÿ’€ High ๐ŸŽฏ 80% rate โฑ 5-25min
๐Ÿ”“ SSL/TLS Attacks
๐Ÿ”“

SSL stripping, POODLE, BEAST, HEARTBLEED, certificate pinning bypass. Force protocol downgrade from HTTPS to HTTP and intercept encrypted communications.

โšก Medium ๐Ÿ’€ Critical ๐ŸŽฏ 72% rate โฑ 10-40min
๐Ÿช Session Hijacking
๐Ÿช

Steal session cookies via XSS, network sniffing, MITM. Sidejacking over unencrypted WiFi, cross-site request forgery (CSRF), session fixation attacks.

โšก Hard ๐Ÿ’€ Critical ๐ŸŽฏ 78% rate โฑ 15-45min
๐ŸŒ
Web Application Attacks
10 attacks
๐Ÿ’‰ SQL Injection (SQLi)
๐Ÿ’‰

UNION-based, blind, time-based, error-based SQLi. Extract entire databases, bypass login, dump hashes. SQLMap automates full exploitation. OWASP #1.

โšก Easy ๐Ÿ’€ Critical ๐ŸŽฏ 92% rate โฑ 5-30min
๐Ÿ”ฅ Cross-Site Scripting (XSS)
๐Ÿ”ฅ

Reflected, stored, DOM-based XSS. Steal cookies, bypass CSP, keylogging, redirect victims, BeEF browser exploitation framework, account takeover.

โšก Easy ๐Ÿ’€ High ๐ŸŽฏ 88% rate โฑ 5-30min
โš™๏ธ Command / Code Injection
โš™๏ธ

OS command injection, RCE via unsanitized exec(), eval() abuse, SSTI (Server-Side Template Injection), XXE, SSRF. Get a shell on the web server directly.

โšก Medium ๐Ÿ’€ Critical ๐ŸŽฏ 80% rate โฑ 10-45min
๐Ÿ“ File Upload Attacks
๐Ÿ“

Bypass file type restrictions to upload PHP/ASP web shells. Magic byte manipulation, double extension bypass (.php.jpg), content-type spoofing for RCE.

โšก Medium ๐Ÿ’€ Critical ๐ŸŽฏ 75% rate โฑ 15-60min
๐Ÿ”€ CSRF / IDOR / Auth Bypass
๐Ÿ”€

Cross-site request forgery, Insecure Direct Object Reference, broken authentication, JWT manipulation, OAuth flaws, password reset poisoning.

โšก Hard ๐Ÿ’€ Critical ๐ŸŽฏ 70% rate โฑ 20-90min
๐Ÿ“‚ Directory Traversal / LFI
๐Ÿ“‚

Path traversal (../../../etc/passwd), Local/Remote File Inclusion โ€” read system files, include malicious scripts, access /etc/shadow, SSH keys, config files.

โšก Medium ๐Ÿ’€ High ๐ŸŽฏ 82% rate โฑ 5-30min
๐Ÿ”Œ API Security Attacks
๐Ÿ”Œ

Mass assignment, broken object-level auth, GraphQL introspection abuse, JWT none algorithm, API key leakage, rate limit bypass, BOLA/BFLA attacks.

โšก Medium ๐Ÿ’€ High ๐ŸŽฏ 78% rate โฑ 10-60min
๐Ÿ“ฆ Insecure Deserialization
๐Ÿ“ฆ

Java, PHP, Python pickle deserialization RCE. Log4Shell, Apache Struts exploits, gadget chains via ysoserial, arbitrary code execution via serialized objects.

โšก Hard ๐Ÿ’€ Critical ๐ŸŽฏ 60% rate โฑ 30-120min
๐Ÿ“„ XXE / SSRF Attacks
๐Ÿ“„

XML External Entity injection to read files, SSRF to reach internal services, metadata endpoint abuse on AWS/GCP, bypass cloud firewall, pivot to internal network.

โšก Expert ๐Ÿ’€ Critical ๐ŸŽฏ 65% rate โฑ 20-90min
๐Ÿ–ฑ๏ธ Clickjacking / UI Redressing
๐Ÿ–ฑ๏ธ

Invisible iframe overlays trick users into clicking attacker-controlled buttons. Bypasses CSRF protection, steals clicks, enables account takeover, cursorjacking.

โšก Medium ๐Ÿ’€ Critical ๐ŸŽฏ 80% rate โฑ 10-30min
๐Ÿค–
AI / ML Attacks 2025-2026
9 attacks
๐Ÿ’ฌ Prompt Injection AI 2026
๐Ÿ’ฌ

Inject malicious instructions into LLM prompts to override system instructions, exfiltrate data, bypass safety filters, perform actions on behalf of the user. Critical threat for AI apps.

โšก Easy ๐Ÿ’€ Critical ๐ŸŽฏ 90% rate โฑ 2-15min
๐Ÿ”“ LLM Jailbreaking AI 2026
๐Ÿ”“

DAN (Do Anything Now), roleplay exploits, token smuggling, many-shot jailbreaking, Base64 encoding bypass, rival LLM persona tricks. Force AI to ignore all safety rules.

โšก Medium ๐Ÿ’€ Critical ๐ŸŽฏ 75% rate โฑ 5-30min
๐Ÿ–ผ๏ธ Adversarial ML Attacks AI
๐Ÿ–ผ๏ธ

Imperceptible perturbations fool neural networks โ€” FGSM, PGD, CarliniWagner attacks. Fool facial recognition, malware detectors, autonomous vehicles, spam filters.

โšก Hard ๐Ÿ’€ Critical ๐ŸŽฏ 65% rate โฑ 30-120min
โ˜ ๏ธ Model Poisoning / Backdoor AI
โ˜ ๏ธ

Inject malicious training data to corrupt model behaviour. BadNets backdoors, neural trojans, federated learning poisoning. Model activates maliciously on specific trigger inputs.

โšก Expert ๐Ÿ’€ Critical ๐ŸŽฏ 50% rate โฑ 60-240min
๐Ÿ” Model Inversion / Extraction AI
๐Ÿ”

Reconstruct training data from model predictions (model inversion), clone model through API queries (model extraction), steal intellectual property and private user data from ML APIs.

โšก Hard ๐Ÿ’€ High ๐ŸŽฏ 60% rate โฑ 45-180min
๐ŸŽญ Deepfakes & Voice Cloning AI 2026
๐ŸŽญ

Generate convincing fake video/audio of real people โ€” CEO fraud calls, fake KYC bypass, political disinformation, evidence fabrication. ElevenLabs, FaceSwap, Wav2Lip attacks.

โšก Medium ๐Ÿ’€ Critical ๐ŸŽฏ 85% rate โฑ 10-60min
๐Ÿ“ง AI-Powered Phishing AI 2026
๐Ÿ“ง

LLM-generated hyper-personalised spear-phishing at scale โ€” zero grammatical errors, context-aware pretexting from OSINT, AI voicemail & SMS generation, autonomous vishing agents.

โšก Easy ๐Ÿ’€ High ๐ŸŽฏ 95% rate โฑ 5-20min
๐Ÿ•ต๏ธ Membership Inference AI
๐Ÿ•ต๏ธ

Determine if specific data was in the training set โ€” violates GDPR, leaks sensitive medical/financial records. Shadow model attacks against commercial ML APIs.

โšก Hard ๐Ÿ’€ High ๐ŸŽฏ 68% rate โฑ 30-120min
๐Ÿง  RAG Poisoning / Agent Hijack AI 2026NEW
๐Ÿง 

Poison retrieval-augmented generation (RAG) knowledge bases, hijack autonomous AI agents via indirect prompt injection, corrupt vector databases, supply chain attacks on LLM pipelines.

โšก Medium ๐Ÿ’€ Critical ๐ŸŽฏ 80% rate โฑ 15-60min
๐Ÿ“ถ
Wireless & WiFi Attacks
5 attacks
๐Ÿ“ถ WPA/WPA2 Cracking
๐Ÿ“ถ

Capture 4-way handshake with airodump-ng, deauth clients with aireplay-ng, crack with hashcat/aircrack-ng. PMKID attack requires no deauth. WPS pixie-dust attack.

โšก Medium๐Ÿ’€ Critical๐ŸŽฏ 82% rateโฑ 10-90min
๐Ÿ˜ˆ Evil Twin / Rogue AP
๐Ÿ˜ˆ

Create a fake access point mimicking legitimate WiFi. Deauth users from real AP, capture all traffic on fake one. Hostapd-wpe for enterprise WPA, Evilginx for credential harvest.

โšก Easy๐Ÿ’€ Critical๐ŸŽฏ 90% rateโฑ 5-30min
๐Ÿฆท Bluetooth Attacks
๐Ÿฆท

BlueSnarfing (steal contacts/files), BlueBorne (RCE without pairing), KNOB attack (encryption downgrade), BLE tracking, bluebugging to control devices remotely.

โšก Easy๐Ÿ’€ High๐ŸŽฏ 75% rateโฑ 5-25min
๐Ÿ’ณ RFID / NFC Cloning
๐Ÿ’ณ

Clone proximity access cards with Proxmark3, skim NFC cards via Flipper Zero, crack HID/EM4100 cards, replay contactless payment cards, bypass physical access control.

โšก Expert๐Ÿ’€ Critical๐ŸŽฏ 70% rateโฑ 15-60min
๐Ÿ“ก IMSI Catcher / 5G Attacks
๐Ÿ“ก

IMSI catchers (Stingray) intercept cellular traffic, 5G NR protocol vulnerabilities, SS7 exploitation for SMS interception and call rerouting, SIM swapping attacks.

โšก Hard๐Ÿ’€ High๐ŸŽฏ 55% rateโฑ 60-180min
๐ŸŽญ
Social Engineering & Phishing
5 attacks
๐ŸŽฃ Phishing / Spear Phishing
๐ŸŽฃ

GoPhish campaigns, Evilginx2 reverse proxy MFA bypass, spear phishing with OSINT context, pretexting emails, credential harvesting pages, O365/Google account compromise.

โšก Easy๐Ÿ’€ Critical๐ŸŽฏ 95% rateโฑ 10-60min
๐Ÿ“ž Vishing & Smishing
๐Ÿ“ž

Voice phishing โ€” impersonate IT helpdesk, bank support, government agencies to extract credentials or MFA codes. SMS phishing with fake package or bank alerts.

โšก Easy๐Ÿ’€ Critical๐ŸŽฏ 92% rateโฑ 5-30min
๐ŸŽช Pretexting & Impersonation
๐ŸŽช

Create fabricated scenarios โ€” pose as vendor, auditor, employee, contractor. Tailgating, piggybacking, identity theft, dumpster diving for sensitive info extraction.

โšก Easy๐Ÿ’€ Critical๐ŸŽฏ 88% rateโฑ 15-120min
๐Ÿ–ฑ๏ธ Baiting & USB Drops
๐Ÿ–ฑ๏ธ

Rubber Ducky / BadUSB hidden as legitimate drive โ€” auto-executes payloads. Lure victims with infected drives/CDs. USB HID injection attacks, malicious chargers (juice jacking).

โšก Medium๐Ÿ’€ Critical๐ŸŽฏ 85% rateโฑ 2-10min
๐Ÿ“ฑ Quishing (QR Code Phishing) 2026
๐Ÿ“ฑ

Malicious QR codes bypass email filters, replace legitimate QR codes on posters/menus, redirect to phishing pages, deliver malware, steal MFA tokens โ€” evades email security.

โšก Easy๐Ÿ’€ High๐ŸŽฏ 88% rateโฑ 5-20min
๐Ÿ”‘
Password & Credential Attacks
5 attacks
๐Ÿ”จ Brute Force & Dictionary
๐Ÿ”จ

Hydra, Medusa, Burp Intruder for online attacks. Hashcat for offline GPU-accelerated hash cracking (MD5/NTLM/bcrypt). RockYou wordlists, custom rules, rainbow tables.

โšก Easy๐Ÿ’€ Critical๐ŸŽฏ 88% rateโฑ 5-240min
๐Ÿ—„๏ธ Credential Stuffing
๐Ÿ—„๏ธ

Use leaked credential databases (HIBP, dark web) to automate login attacks across multiple services. Password reuse exploitation โ€” one breach compromises all accounts.

โšก Medium๐Ÿ’€ Critical๐ŸŽฏ 78% rateโฑ 10-60min
๐Ÿ’ฆ Password Spraying
๐Ÿ’ฆ

Try common passwords against many accounts to avoid lockout. O365, Exchange, VPN spray with MSOLSpray/Spray. Particularly effective against corporate environments with weak policies.

โšก Easy๐Ÿ’€ High๐ŸŽฏ 82% rateโฑ 5-30min
๐ŸŽซ Pass-the-Hash / Kerberoasting
๐ŸŽซ

Authenticate with NTLM hash instead of plaintext (Mimikatz, Impacket). Kerberoasting โ€” request service tickets offline and crack to get service account passwords.

โšก Hard๐Ÿ’€ Critical๐ŸŽฏ 72% rateโฑ 20-90min
๐Ÿ“ฒ MFA Bypass Attacks 2026
๐Ÿ“ฒ

MFA push notification fatigue (bombing), SIM swapping, OTP phishing in real-time via Evilginx2, TOTP seed theft, SS7 SMS interception, OAuth token theft. Bypass 2FA entirely.

โšก Hard๐Ÿ’€ Critical๐ŸŽฏ 75% rateโฑ 15-60min
๐Ÿฆ 
Malware, Ransomware & Trojans
5 attacks
๐Ÿ’ฐ Ransomware
๐Ÿ’ฐ

Encrypt victim files with AES-256/RSA-2048, demand Bitcoin ransom. LockBit, BlackCat, Conti TTPs. Double extortion (encrypt + exfil). Disable VSS, spread via SMB, exfil before encryption.

โšก Hard๐Ÿ’€ Critical๐ŸŽฏ 70% rateโฑ 30-120min
๐ŸŒ‘ Rootkits & Persistence
๐ŸŒ‘

Kernel-level rootkits hide processes/files from OS, UEFI/bootkit persistence survives reinstall, registry run keys, scheduled tasks, WMI subscriptions, DLL hijacking for persistence.

โšก Expert๐Ÿ’€ Critical๐ŸŽฏ 55% rateโฑ 60-240min
๐Ÿ•ธ๏ธ C2 / RAT / Botnet
๐Ÿ•ธ๏ธ

Metasploit Meterpreter, Cobalt Strike, Sliver, Havoc C2 frameworks. DNS-over-HTTPS C2, encrypted C2 channels, domain fronting, peer-to-peer botnets, fileless malware.

โšก Medium๐Ÿ’€ Critical๐ŸŽฏ 78% rateโฑ 20-120min
๐Ÿ“ฆ Supply Chain Attacks
๐Ÿ“ฆ

Compromise software build pipelines (SolarWinds, 3CX, XZ Utils backdoor). NPM/PyPI package typosquatting, dependency confusion, malicious CI/CD injection, code signing abuse.

โšก Hard๐Ÿ’€ Critical๐ŸŽฏ 60% rateโฑ 60-480min
๐ŸŒซ๏ธ Fileless Malware / LOLBins
๐ŸŒซ๏ธ

Process injection (process hollowing, DLL injection), PowerShell-based attacks, Living-off-the-Land binaries (certutil, regsvr32, mshta), memory-only malware evades AV/EDR.

โšก Hard๐Ÿ’€ Critical๐ŸŽฏ 72% rateโฑ 30-120min
๐Ÿข
Active Directory & Windows Attacks
5 attacks
๐Ÿฉธ AD Lateral Movement
๐Ÿฉธ

BloodHound/SharpHound AD mapping, DCSync, Golden/Silver tickets, AS-REP Roasting, ACL abuse, AdminSDHolder persistence. Pwn domain in hours from foothold.

โšก Hard๐Ÿ’€ Critical๐ŸŽฏ 70% rateโฑ 30-240min
โฌ†๏ธ Privilege Escalation
โฌ†๏ธ

Windows: unquoted service paths, weak permissions, always install elevated, token impersonation. Linux: SUID/GUID binaries, sudo misconfig, kernel exploits, cron jobs, PATH hijacking.

โšก Hard๐Ÿ’€ Critical๐ŸŽฏ 75% rateโฑ 20-120min
๐ŸชŸ Windows CVE Exploits
๐ŸชŸ

ZeroLogon (CVE-2020-1472), PrintNightmare, EternalBlue/MS17-010, noPac, PetitPotam, NTLM relay, MS-RPRN, Exchange ProxyLogon โ€” critical Windows domain exploits.

โšก Expert๐Ÿ’€ Critical๐ŸŽฏ 65% rateโฑ 15-60min
๐Ÿ” NTLM Relay Attacks
๐Ÿ”

Responder captures NTLM hashes, ntlmrelayx relays auth to other machines, ADCS relay for domain takeover, SMB signing bypass. Compromise entire domain without cracking hashes.

โšก Hard๐Ÿ’€ Critical๐ŸŽฏ 68% rateโฑ 15-60min
๐Ÿ—‚๏ธ DCSync / LSASS Dumping
๐Ÿ—‚๏ธ

Mimikatz sekurlsa::logonpasswords dumps cleartext creds from LSASS. DCSync replicates domain password hashes without touching DC disk. Dump entire AD with one command.

โšก Expert๐Ÿ’€ Critical๐ŸŽฏ 72% rateโฑ 5-30min
โ˜๏ธ
Cloud & Container Attacks
4 attacks
โ˜๏ธ AWS / Cloud Misconfiguration
โ˜๏ธ

IMDSv1 SSRF metadata credential theft, overly-permissive IAM, public S3 buckets with sensitive data, exposed security groups, assume-role escalation, CloudTrail evasion.

โšก Hard๐Ÿ’€ Critical๐ŸŽฏ 72% rateโฑ 20-120min
๐Ÿณ Container Escape / K8s
๐Ÿณ

Docker privileged container escape, cgroup v1 notifyrelease exploit, Kubernetes RBAC abuse, etcd unauthenticated access, malicious admission webhooks, pod service account token theft.

โšก Hard๐Ÿ’€ Critical๐ŸŽฏ 65% rateโฑ 30-120min
ฮป Serverless / Function Attacks
โšก

Lambda environment variable secrets theft, cold-start timing attacks, shared execution environment data leakage, dependency injection in function packages, event injection attacks.

โšก Medium๐Ÿ’€ High๐ŸŽฏ 68% rateโฑ 15-90min
๐Ÿ”ต Azure AD / Entra ID Attacks
๐Ÿ”ต

Azure AD token theft, Service Principal abuse, Managed Identity escalation, PRT theft via pass-the-cookie, OAuth consent phishing, AADInternals lateral movement across tenants.

โšก Expert๐Ÿ’€ Critical๐ŸŽฏ 62% rateโฑ 30-180min
๐Ÿญ
Physical & Hardware Attacks
3 attacks
๐Ÿ” Physical Security Bypass
๐Ÿ”

Tailgating, lock picking, bump keys, under-door tools, REX sensors. Bypass electronic access with relay attack on key fobs, badge cloning, emergency door exploitation.

โšก Easy๐Ÿ’€ Critical๐ŸŽฏ 88% rateโฑ 2-30min
๐Ÿ”ง Hardware Hacking / Implants
๐Ÿ”ง

JTAG/UART debug port exploitation, firmware extraction via SPI flash, hardware keyloggers, network tap implants, evil maid attacks on unattended devices, cold boot RAM attacks.

โšก Expert๐Ÿ’€ Critical๐ŸŽฏ 55% rateโฑ 60-480min
๐Ÿ“Š Side-Channel Attacks
๐Ÿ“Š

Timing attacks break constant-time assumptions, power analysis on smart cards, Spectre/Meltdown CPU vulnerabilities, cache-timing attacks, acoustic cryptanalysis, EM emanation.

โšก Hard๐Ÿ’€ High๐ŸŽฏ 50% rateโฑ 60-300min
๐Ÿ”
No attacks found
Try different search terms or remove filters
โš ๏ธ EDUCATIONAL & AUTHORIZED TESTING ONLY โš ๏ธ

All attack techniques are for educational purposes and authorized security testing only. Unauthorized use is illegal and punishable by law. NepHack.ai โ€” Ethical Hacking Education 2026