Your IP: Unknown · Your Status: ProtectedUnprotectedUnknown

Skip to main content

Remote attack

Remote attack

(also remote exploit)

Remote attack definition

A remote attack (also known as a remote exploit) is when a hacker targets one computer or an entire network. The attacker looks for vulnerabilities in the computer or the network’s security system to gain access and steal data, introduce viruses, or cause damage to the targeted network. Based on the tools and methods attackers use to compromise the targeted system, remote attacks can be categorized into different types.

Common remote attack types

  • Domain name system (DNS) cache poisoning. Also known as DNS spoofing, domain name system poisoning is when hackers compromise DNS records to redirect users to fake, potentially malicious websites.
  • Port scanning. Hackers use a port scanner to identify open ports on a network host and find potential vulnerabilities to gain access to the network.
  • Phishing. Attackers send emails, messages, or texts to potential victims that include malicious links. The messages typically have an element of urgency, panic, or fear to cloud the victim’s judgment and get them to click on the link.
  • Password spraying. Hackers identify a large number of user accounts and attempt to gain unauthorized access to them by trying the most common passwords.

Further reading

Ultimate digital security