ExtraHop is a Leader in the Gartner® Magic Quadrant™ for Network Detection and Response

Arrow pointing right
ExtraHop Logo
  • Productschevron right
  • Solutionschevron right
  • Why ExtraHopchevron right
  • Eventschevron right
  • Resourceschevron right

Cyberattack Glossary

Network attacks are techniques used by threat actors to achieve goals in their target infrastructure. Learn how these attacks work and what you can do to protect against them.

Extrahop post covering example cyberattack scenarios and how to address them

Decryption enhanced

What is a Brute Force Attack? Definition & Prevention

Detection Supported

A brute force attack is a trial-and-error attack method to guess a password, encryption key, or hidden webpage. See brute force attack examples.

Extrahop post covering example cyberattack scenarios and how to address them

Malware Obfuscation

Detection Supported

What is Malware Obfuscation? See techniques, history of attacks, and effective detection methods.

Extrahop post covering example cyberattack scenarios and how to address them

What are Supply Chain Attacks? Definition & Prevention

Detection Supported

What is a supply chain attack? Types of supply chain attacks, history of attacks, and effective methods to protect enterprise organizations.

Extrahop post covering example cyberattack scenarios and how to address them

Decryption enhanced

What are XSS Attacks? Definition & Prevention

Detection Supported

Learn about cross-site scripting (XSS) attacks and the top three ways to prevent an attack. See risk factors and examples.

Extrahop post covering example cyberattack scenarios and how to address them

What is C2 Beaconing? Definition & Prevention

Detection Reported

Learn how to detect C2 beaconing. C2 beaconing is a method of command and control communication between malware-infected hosts (like those that make up botnets) and the controlling server.

Extrahop post covering example cyberattack scenarios and how to address them

What is Cryptomining Malware? Definition & Prevention

Detection Supported

Cryptomining malware, or 'cryptojacking,' is a malware attack that co-opts the target's computing resources in order to mine cryptocurrencies like bitcoin.

Extrahop post covering example cyberattack scenarios and how to address them

Decryption enhanced

What is HTTP Request Smuggling? Definition & Prevention

Detection Supported

HTTP request smuggling attack takes advantage of inconsistencies in how servers process requests from multiple senders. Learn more and see examples.

Extrahop post covering example cyberattack scenarios and how to address them

Decryption enhanced

What is a DCSync Attack? Definition & Prevention

Detection Supported

A DCSync attack uses commands in MS-DRSR to pretend to be a domain controller (DC) in order to get user credentials. Learn more and see examples of attacks.

Extrahop post covering example cyberattack scenarios and how to address them

Decryption enhanced

What is a DNS Tunneling Attack? Definition & Prevention

Detection Supported

DNS tunneling routes DNS requests to the attacker's server, providing attackers a covert command and control channel. Learn more and see DNS tunneling examples.

Extrahop post covering example cyberattack scenarios and how to address them

What is a Denial of Service Attack? Definition & Prevention

Detection Supported

Denial of service (DoS) & distributed denial of service (DDoS) attacks overload a machine or network to make it unavailable. Learn how to respond to an attack.

Extrahop post covering example cyberattack scenarios and how to address them

What is a Port Scan Attack? Definition & Prevention

Detection Supported

Port scanning attackers scope out their target environment by sending packets to specific ports on a host and using the responses to find vulnerabilities.

Extrahop post covering example cyberattack scenarios and how to address them

Decryption enhanced

What is a Ransomware Attack? Definition & Prevention

Detection Supported

Ransomware is a type of malicious software which encrypts files, making them inaccessible until a ransom is paid. Learn more and see examples.

Extrahop post covering example cyberattack scenarios and how to address them

What is a Remote Code Execution (RCE)? Definition & Prevention

Detection Supported

What are RCE Attacks and Vulnerabilities? See attack examples, history of attacks, and effective methods to protect enterprise organizations.

Extrahop post covering example cyberattack scenarios and how to address them

Decryption enhanced

What is a Remote Services Exploitation? Definition & Prevention

Detection Supported

Attacks like RDP exploitation hijack remote access tools to access a network's internal systems. Learn more and see examples.

Extrahop post covering example cyberattack scenarios and how to address them

Decryption enhanced

What is a SQL Injection (SQLi) Attack? Definition & Prevention

Detection Supported

By injecting an SQL command into a data entry field, attackers communicate directly with your database. Learn more and see examples such as RDP exploitation.