Skip to main content

1. Denial of Service (DoS) and Distributed Denial of Service (DDoS)

2. Man-in-the-Middle (MitM)

3. Phishing

4. Structured Query Language (SQL) Injection

5. Cross-site Scripting (XSS)