1. Ethical Hacking
- Goal: Find and fix security problems in systems before bad hackers can exploit them.
- How: Hackers use safe methods to test vulnerabilities.
- Example: Testing a bank’s app for weaknesses in logins or transactions.
- Why it’s cool: Protects systems and makes the internet safer for everyone.
2. Smurf Attack
- Goal: Overload a victim’s network using fake traffic.
- How: Sends fake requests to many devices, tricking them into flooding the target.
- Example: Like sending thousands of fake pizza orders to one house.
- Why it’s cool: Helps learn how attackers use simple tricks to cause big disruptions.
3. UDP Flooding
- Goal: Jam a network by sending tons of useless UDP data.
- How: Attackers send nonstop UDP packets to overwhelm resources.
- Example: Like a prank caller dialing a phone so others can’t reach it.
- Why it’s cool: Shows how overloading weak systems can paralyze them.
4. SYN Attack