{"id":1674,"date":"2023-04-07T15:46:18","date_gmt":"2023-04-07T15:46:18","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1674"},"modified":"2024-05-31T23:46:17","modified_gmt":"2024-05-31T23:46:17","slug":"a-2023-ig-reszletesen-ismert-kibertamadasok-tipusai","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-2023-ig-reszletesen-ismert-kibertamadasok-tipusai\/","title":{"rendered":"Az ismert kibert\u00e1mad\u00e1sok t\u00edpusai r\u00e9szletesen 2023-ig"},"content":{"rendered":"<p>A kibert\u00e1mad\u00e1sok \u00e9s kock\u00e1zatok sikeres megv\u00e9d\u00e9se \u00e9rdek\u00e9ben elengedhetetlen meg\u00e9rteni azok jellemz\u0151it \u00e9s m\u0171k\u00f6d\u00e9s\u00e9t. A kibert\u00e1mad\u00e1sok f\u0151 kateg\u00f3ri\u00e1i az SQL injekci\u00f3s t\u00e1mad\u00e1sok, a Cross-Site Scripting \u00e9s a szolg\u00e1ltat\u00e1smegtagad\u00e1s (DoS). Ebben a cikkben ezeket a jelent\u0151s kiberbiztons\u00e1gi k\u00e9rd\u00e9seket fogjuk megvizsg\u00e1lni.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"sql-injection-attacks\"><strong>SQL injekci\u00f3s t\u00e1mad\u00e1sok<\/strong><\/h2>\n\n\n<p>Az SQL lehet\u0151v\u00e9 teszi a kommunik\u00e1ci\u00f3t az adatb\u00e1zisokban t\u00e1rolt adatokkal, f\u00fcggetlen\u00fcl att\u00f3l, hogy helyileg t\u00e1rolj\u00e1k-e vagy t\u00e1voli webszervereken. Ez a nyelv lehet\u0151v\u00e9 teszi sz\u00e1munkra, hogy kinyerj\u00fck \u00e9s m\u00f3dos\u00edtsuk az inform\u00e1ci\u00f3kat szkriptek vagy kis programok seg\u00edts\u00e9g\u00e9vel. Sz\u00e1mos szerver, amely szolg\u00e1ltat\u00e1sok vagy alkalmaz\u00e1sok sz\u00e1m\u00e1ra t\u00e1rol inform\u00e1ci\u00f3kat, SQL-re t\u00e1maszkodik.<\/p>\n\n\n\n<p>Ahogy az OPSWAT magyar\u00e1zza, egy SQL injekci\u00f3s t\u00e1mad\u00e1s ezeket a szervereket c\u00e9lozza meg, rosszindulat\u00fa k\u00f3dot haszn\u00e1lva a t\u00e1rolt adatok kinyer\u00e9s\u00e9re. Ez a helyzet k\u00fcl\u00f6n\u00f6sen aggaszt\u00f3v\u00e1 v\u00e1lhat, ha a t\u00e1rolt adatok mag\u00e1n\u00fcgyf\u00e9l-inform\u00e1ci\u00f3kat tartalmaznak, p\u00e9ld\u00e1ul hitelk\u00e1rtyasz\u00e1mokat, felhaszn\u00e1l\u00f3neveket, jelszavakat vagy min\u0151s\u00edtett inform\u00e1ci\u00f3kat.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"300\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/common-SQL-injection.jpg\" alt=\"SQL injekci\u00f3s t\u00e1mad\u00e1s\" class=\"wp-image-1676\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/common-SQL-injection.jpg 696w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/common-SQL-injection-300x129.jpg 300w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/figure>\n\n\n\n<p>N\u00e9h\u00e1ny elterjedt SQL injekci\u00f3s p\u00e9lda a k\u00f6vetkez\u0151ket tartalmazza:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Rejtett adatok el\u00e9r\u00e9se egy SQL lek\u00e9rdez\u00e9s m\u00f3dos\u00edt\u00e1s\u00e1val tov\u00e1bbi eredm\u00e9nyek el\u00e9r\u00e9s\u00e9hez.<\/li>\n\n\n\n<li>Az alkalmaz\u00e1s logik\u00e1j\u00e1nak megzavar\u00e1sa egy lek\u00e9rdez\u00e9s m\u00f3dos\u00edt\u00e1s\u00e1val, hogy beavatkozzon az alkalmaz\u00e1s tervezett m\u0171k\u00f6d\u00e9s\u00e9be.<\/li>\n\n\n\n<li>UNION t\u00e1mad\u00e1sok, amelyek lehet\u0151v\u00e9 teszik az adatok visszanyer\u00e9s\u00e9t k\u00fcl\u00f6nb\u00f6z\u0151 adatb\u00e1zis-t\u00e1bl\u00e1kb\u00f3l.<\/li>\n\n\n\n<li>Az adatb\u00e1zis vizsg\u00e1lata annak verzi\u00f3j\u00e1r\u00f3l \u00e9s szervez\u00e9s\u00e9r\u0151l sz\u00f3l\u00f3 r\u00e9szletek \u00f6sszegy\u0171jt\u00e9s\u00e9re.<\/li>\n\n\n\n<li>Vak SQL injekci\u00f3, ahol a vez\u00e9relt lek\u00e9rdez\u00e9si eredm\u00e9nyek nem jelennek meg az alkalmaz\u00e1s v\u00e1laszaiban.<\/li>\n<\/ol>\n\n\n<h2 class=\"wp-block-heading\" id=\"crosssite-scripting-xss\"><strong>Keresztoldali szkriptel\u00e9s (XSS)<\/strong><\/h2>\n\n\n<p>Ebben a fajta kibert\u00e1mad\u00e1sban a felhaszn\u00e1l\u00f3 a c\u00e9lpont, nem pedig a szerver, mivel a t\u00e1mad\u00e1s a felhaszn\u00e1l\u00f3 b\u00f6ng\u00e9sz\u0151j\u00e9ben hajt\u00f3dik v\u00e9gre, amikor hozz\u00e1f\u00e9r, nem pedig mag\u00e1n a szerveren. Az ilyen cross-site t\u00e1mad\u00e1sok egyik m\u00f3dszere a rosszindulat\u00fa k\u00f3d injekt\u00e1l\u00e1sa egy megjegyz\u00e9sbe vagy szkriptbe, amely automatikusan fut. A cross-site scripting t\u00e1mad\u00e1sok s\u00falyosan k\u00e1ros\u00edthatj\u00e1k egy weboldal h\u00edrnev\u00e9t az\u00e1ltal, hogy vesz\u00e9lyeztetik a felhaszn\u00e1l\u00f3i inform\u00e1ci\u00f3kat an\u00e9lk\u00fcl, hogy b\u00e1rmilyen nyomot vagy jelz\u00e9st hagyn\u00e1nak a rosszindulat\u00fa tev\u00e9kenys\u00e9gr\u0151l.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cross-Site-Scripting-XSS.jpg\" alt=\"Keresztoldali szkriptel\u00e9s (XSS)\" class=\"wp-image-1677\"\/><\/figure>\n\n\n\n<p>A Cross-site scripting (XSS) egy olyan kibert\u00e1mad\u00e1s, ahol rosszindulat\u00fa egy\u00e9nek k\u00e1ros szkriptet injekt\u00e1lnak egy weboldalba, amelyet azt\u00e1n feldolgoznak \u00e9s v\u00e9grehajtanak. Ez a t\u00e1mad\u00e1s \u00e1ltal\u00e1ban a weboldal felhaszn\u00e1l\u00f3i bemeneti adatokba vetett bizalm\u00e1ra t\u00e1maszkodik, \u00e9s mag\u00e1ban foglalja egy URL elk\u00fcld\u00e9s\u00e9t, amely tartalmazza a rosszindulat\u00fa payloadot a c\u00e9lzott felhaszn\u00e1l\u00f3nak. Az XSS t\u00e1mad\u00e1sok els\u0151dleges c\u00e9lja a szem\u00e9lyes adatok, munkamenet s\u00fctik ellop\u00e1sa \u00e9s a szoci\u00e1lis m\u00e9rn\u00f6ki technik\u00e1k alkalmaz\u00e1sa, t\u00f6bbek k\u00f6z\u00f6tt. Az XSS t\u00e1mad\u00e1sok h\u00e1rom f\u0151 t\u00edpusa l\u00e9tezik, \u00e9s most megvitatjuk mindegyik t\u00edpust \u00e9s azokat a l\u00e9p\u00e9seket, amelyek sz\u00fcks\u00e9gesek a v\u00e9dekez\u00e9shez.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"translation-block\"><strong>Reflekt\u00e1lt Cross-Site Scripting<\/strong>: Egy reflekt\u00e1lt XSS t\u00e1mad\u00e1s \u00e1ltal\u00e1ban azzal j\u00e1r, hogy a payloadot egy HTTP k\u00e9r\u00e9s param\u00e9ter\u00e9be injekt\u00e1lj\u00e1k. A webalkalmaz\u00e1s k\u00e9s\u0151bb feldolgozza \u00e9s beveti an\u00e9lk\u00fcl, hogy ellen\u0151rizn\u00e9 vagy elker\u00fcln\u00e9. Ez az XSS legegyszer\u0171bb form\u00e1ja, \u00e9s a rosszindulat\u00fa szkript, amely a felhaszn\u00e1l\u00f3 b\u00f6ng\u00e9sz\u0151j\u00e9t c\u00e9lozza, k\u00f6nnyen m\u00f3dos\u00edthat\u00f3, potenci\u00e1lisan an\u00e9lk\u00fcl, hogy a felhaszn\u00e1l\u00f3 \u00e9szleln\u00e9 a t\u00e1mad\u00e1st.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>T\u00e1rolt Cross-Site Scripting<\/strong>: Ebben a v\u00e1ltozatban a webalkalmaz\u00e1s t\u00e1rolja a bemeneti \u00e9rt\u00e9ket, amely tartalmazza a k\u00e1ros szkriptet, egy t\u00e1rol\u00f3k\u00f6zegben. A szkript addig marad meg, am\u00edg az alkalmaz\u00e1s el\u0151 nem h\u00edvja az \u00e9rt\u00e9ket \u00e9s be nem \u00e9p\u00edti a HTML dokumentumba. Ennek a sebezhet\u0151s\u00e9gnek a gyakori bel\u00e9p\u00e9si pontjai k\u00f6z\u00e9 tartoznak a weboldal megjegyz\u00e9sek, blogbejegyz\u00e9sek, felhaszn\u00e1l\u00f3nevek, cseveg\u00e9sek, kapcsolatfelv\u00e9teli \u0171rlapok \u00e9s rendel\u00e9si adatok. A tart\u00f3s XSS k\u00fcl\u00f6nb\u00f6z\u0151 forr\u00e1sokb\u00f3l sz\u00e1rmazhat, a leggyakoribb az HTTP protokoll v\u00e1laszai, valamint az SMTP, azonnali \u00fczenetk\u00fcld\u0151 szolg\u00e1ltat\u00e1sok \u00e9s socket \u00e9rtes\u00edt\u00e9sek.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>DOM-alap\u00fa Cross-Site Scripting<\/strong>: A Document Object Model (DOM) egy programoz\u00e1si interf\u00e9sz, amely egy webdokumentum szerkezet\u00e9t k\u00e9pviseli \u00e9s \u00f6sszekapcsolja egy szkriptnyelvvel. Lehet\u0151v\u00e9 teszi dokumentumok, mint p\u00e9ld\u00e1ul HTML vagy XML szervez\u00e9s\u00e9t, \u00e9s lehet\u0151v\u00e9 teszi a programok sz\u00e1m\u00e1ra, hogy megv\u00e1ltoztass\u00e1k a dokumentum szerkezet\u00e9t, st\u00edlus\u00e1t \u00e9s tartalm\u00e1t. Egy DOM-alap\u00fa XSS t\u00e1mad\u00e1sban a rosszindulat\u00fa payload a DOM k\u00f6rnyezet m\u00f3dos\u00edt\u00e1s\u00e1val hajt\u00f3dik v\u00e9gre az \u00e1ldozat b\u00f6ng\u00e9sz\u0151j\u00e9ben, \u00edgy a felhaszn\u00e1l\u00f3 tudt\u00e1n k\u00edv\u00fcl futtatja a kliens oldali k\u00f3dot. A JavaScript k\u00f6nyvt\u00e1rak elterjed\u00e9s\u00e9vel egyre gyakoribb\u00e1 v\u00e1lt az adatok feldolgoz\u00e1sa megb\u00edzhatatlan forr\u00e1sokb\u00f3l (bizonytalan vagy helytelen\u00fcl k\u00f3dolt) a kliens oldalon, gyakran \u00edrva ezeket az adatokat a weboldal DOM-j\u00e1ba.<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"the-evolution-of-crosssite-scripting-xss\">A Cross-Site Scripting (XSS) fejl\u0151d\u00e9se<\/h3>\n\n\n<p>A sebezhet\u0151s\u00e9g kezdeti felfedez\u00e9se \u00f3ta kiterjedt kutat\u00e1sokat v\u00e9geztek ezen a ter\u00fcleten. Ahogy a programoz\u00e1si nyelvek fejl\u0151dnek, \u00faj m\u00f3dszerek mer\u00fclnek fel a Cross-Site Scripting kihaszn\u00e1l\u00e1s\u00e1ra, a programoz\u00e1si nyelvek \u00e9s a webfejleszt\u00e9si megk\u00f6zel\u00edt\u00e9sek sz\u00e9les sk\u00e1l\u00e1ja miatt. Egy \u00e9rdekes p\u00e9lda a JSFuck, egy programoz\u00e1si st\u00edlus, amely csak hat karaktert haszn\u00e1l, \u00e9s k\u00e9pes JavaScript k\u00f3dot gener\u00e1lni \u00e9s v\u00e9grehajtani minim\u00e1lis karakterekkel, a JavaScript nyelv alapj\u00e1n. Fontos figyelembe venni ezt a programoz\u00e1si st\u00edlust, amikor strat\u00e9gi\u00e1kat dolgozunk ki b\u00e1rmilyen Cross-Site Scripting form\u00e1j\u00e1nak enyh\u00edt\u00e9s\u00e9re.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"denial-of-service-dos-and-distributed-denial-of-service-ddos\"><strong>Szolg\u00e1ltat\u00e1smegtagad\u00e1s (DoS) \u00e9s Elosztott szolg\u00e1ltat\u00e1smegtagad\u00e1s (DDoS)<\/strong><\/h2>\n\n\n<p>Ezek a t\u00e1mad\u00e1sok egy weboldalt forgalommal \u00e1rasztanak el, ami a szerver\u00e9t t\u00falterheli a k\u00e9r\u00e9sekkel, \u00e9s k\u00e9ptelenn\u00e9 teszi a tartalom megjelen\u00edt\u00e9s\u00e9re a felhaszn\u00e1l\u00f3k sz\u00e1m\u00e1ra. Sok esetben ezeket a kibert\u00e1mad\u00e1sokat t\u00f6bb sz\u00e1m\u00edt\u00f3g\u00e9p hajtja v\u00e9gre egyidej\u0171leg, ami k\u00fcl\u00f6n\u00f6sen neh\u00e9zz\u00e9 teszi az ellens\u00falyoz\u00e1st. A t\u00e1mad\u00f3k a vil\u00e1g k\u00fcl\u00f6nb\u00f6z\u0151 IP-c\u00edmeir\u0151l sz\u00e1rmazhatnak, ami tov\u00e1bb bonyol\u00edtja a potenci\u00e1lis forr\u00e1s azonos\u00edt\u00e1s\u00e1t.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Denial-of-service-DoS-and-DDoS.jpg\" alt=\"Szolg\u00e1ltat\u00e1smegtagad\u00e1s (DoS \u00e9s DDoS)\" class=\"wp-image-1678\"\/><\/figure>\n\n\n\n<p>Ez a kibert\u00e1mad\u00e1s c\u00e9lja egy rendszer, alkalmaz\u00e1s vagy g\u00e9p m\u0171k\u00f6d\u00e9sk\u00e9ptelenn\u00e9 t\u00e9tele, akad\u00e1lyozva annak tervezett szolg\u00e1ltat\u00e1s\u00e1t. A t\u00e1mad\u00e1s c\u00e9lozhatja az inform\u00e1ci\u00f3forr\u00e1st (pl. egy alkalmaz\u00e1st), a kommunik\u00e1ci\u00f3s csatorn\u00e1t vagy a sz\u00e1m\u00edt\u00f3g\u00e9pes h\u00e1l\u00f3zatot. A webszerverek korl\u00e1tozott kapacit\u00e1ssal rendelkeznek a k\u00e9r\u00e9sek vagy felhaszn\u00e1l\u00f3i kapcsolatok kezel\u00e9s\u00e9re; ennek a hat\u00e1rnak a t\u00fall\u00e9p\u00e9se lass\u00edthatja vagy le\u00e1ll\u00edthatja a szerver v\u00e1lasz\u00e1t, ami esetleg megszakad\u00e1sokhoz vezethet. A szolg\u00e1ltat\u00e1smegtagad\u00e1s (DoS) \u00e9s az elosztott szolg\u00e1ltat\u00e1smegtagad\u00e1s (DDoS) k\u00e9t technika az ilyen t\u00e1mad\u00e1sok v\u00e9grehajt\u00e1s\u00e1ra. Az els\u0151dleges k\u00fcl\u00f6nbs\u00e9g a t\u00e1mad\u00e1sban r\u00e9szt vev\u0151 sz\u00e1m\u00edt\u00f3g\u00e9pek vagy IP-k sz\u00e1ma.<\/p>\n\n\n\n<p>A DoS t\u00e1mad\u00e1sokban sz\u00e1mos k\u00e9r\u00e9s ugyanarr\u00f3l a g\u00e9pr\u0151l vagy IP-c\u00edmr\u0151l sz\u00e1rmazik, ami a rendelkez\u00e9sre \u00e1ll\u00f3 er\u0151forr\u00e1sokat fogyasztja. V\u00e9g\u00fcl a szolg\u00e1ltat\u00e1s t\u00falterheltt\u00e9 v\u00e1lik, \u00e9s elkezdi elutas\u00edtani a k\u00e9r\u00e9seket, ami szolg\u00e1ltat\u00e1smegtagad\u00e1st eredm\u00e9nyez. A DDoS t\u00e1mad\u00e1sok ezzel szemben t\u00f6bb sz\u00e1m\u00edt\u00f3g\u00e9pet vagy IP-c\u00edmet vonnak be egyszerre ugyanazon szolg\u00e1ltat\u00e1s c\u00e9lz\u00e1s\u00e1ra. A DDoS t\u00e1mad\u00e1sokat nehezebb \u00e9szlelni, mert a k\u00e9r\u00e9sek k\u00fcl\u00f6nb\u00f6z\u0151 IP-kr\u0151l sz\u00e1rmaznak, ami lehetetlenn\u00e9 teszi az adminisztr\u00e1torok sz\u00e1m\u00e1ra, hogy blokkolj\u00e1k a k\u00e9r\u0151 IP-t, ahogy azt a DoS t\u00e1mad\u00e1sok eset\u00e9ben tehetn\u00e9k.<\/p>\n\n\n\n<p>A DDoS t\u00e1mad\u00e1sban r\u00e9szt vev\u0151 sz\u00e1m\u00edt\u00f3g\u00e9pek rosszindulat\u00fa szoftverfert\u0151z\u00e9s r\u00e9v\u00e9n ker\u00fclnek bevon\u00e1sra, botokk\u00e1 vagy zombikk\u00e1 alak\u00edtva \u0151ket, amelyeket a kiberb\u0171n\u00f6z\u0151k t\u00e1volr\u00f3l ir\u00e1ny\u00edthatnak. A botok csoportja, azaz ugyanazzal a rosszindulat\u00fa szoftverrel fert\u0151z\u00f6tt sz\u00e1m\u00edt\u00f3g\u00e9pek, botnetet alkotnak, amelyet zombi h\u00e1l\u00f3zatnak neveznek. Ez a h\u00e1l\u00f3zat jelent\u0151sen nagyobb kapacit\u00e1ssal rendelkezik a szerverek t\u00falterhel\u00e9s\u00e9re, mint egyetlen g\u00e9p \u00e1ltal v\u00e9grehajtott t\u00e1mad\u00e1s.<\/p>\n\n\n\n<p><strong>K\u00f6vetkeztet\u00e9s<\/strong><\/p>\n\n\n\n<p>\u00cdgy a fent eml\u00edtett inform\u00e1ci\u00f3k alapj\u00e1n a megl\u00e9v\u0151 kiberfenyeget\u00e9sek k\u00f6z\u00e9 tartozik a Malware, Ransomware, V\u00edrusok, F\u00e9rgek, Tr\u00f3jaiak, Szolg\u00e1ltat\u00e1smegtagad\u00e1s, Rootkitek, Adathal\u00e1szat, K\u00e9mprogramok, Rekl\u00e1mprogramok, \u00e9s ezek kombin\u00e1ci\u00f3i, amelyeket k\u00fcl\u00f6nb\u00f6z\u0151 kibert\u00e1mad\u00e1si mechanizmusok t\u00e1mogatnak. <\/p>\n\n\n\n<p>Ezek a t\u00e1mad\u00e1st\u00edpusok gyakran t\u00e1maszkodnak egym\u00e1sra, t\u00f6bb technik\u00e1t alkalmazva egyetlen t\u00e1mad\u00e1son bel\u00fcl. P\u00e9ld\u00e1ul egy Tr\u00f3jai bevethet\u0151 egy k\u00e9s\u0151bbi DDoS t\u00e1mad\u00e1s elind\u00edt\u00e1s\u00e1ra, m\u00edg egy Rootkit v\u00e9grehajthat\u00f3, miut\u00e1n jelszavakat szereztek adathal\u00e1szat r\u00e9v\u00e9n.<\/p>\n\n\n\n<p>A kiberbiztons\u00e1gi szak\u00e9rt\u0151k azt javasolj\u00e1k, hogy legy\u00fcnk \u00f3vatosak az ingyenes v\u00edrusirt\u00f3 szoftverekkel, mivel azok telep\u00edt\u00e9se el\u0151re nem l\u00e1that\u00f3 k\u00f6vetkezm\u00e9nyekhez vezethet. Fontos meg\u00e9rteni, hogy az abszol\u00fat biztons\u00e1g nem l\u00e9tezik. Mindig lesznek olyan egy\u00e9nek, akik elk\u00f6telezettek a rendszerek \u00e9s alkalmaz\u00e1sok sebezhet\u0151s\u00e9geinek felfedez\u00e9s\u00e9ben, hogy azokat rosszindulat\u00faan kihaszn\u00e1lj\u00e1k. Ugyanakkor magas fok\u00fa v\u00e9delem el\u00e9r\u00e9se lehets\u00e9ges.<\/p>","protected":false},"excerpt":{"rendered":"<p>To successfully defend against cyberattacks and risks, it is crucial to comprehend their characteristics and actions. The main categories of cyberattacks are SQL Injection Attacks, Cross-Site Scripting, and Denial of\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-2023-ig-reszletesen-ismert-kibertamadasok-tipusai\/\">Folytat\u00e1s <span class=\"screen-reader-text\">Az ismert kibert\u00e1mad\u00e1sok t\u00edpusai r\u00e9szletesen 2023-ig<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1689,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-1674","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberattacks Types (2023) - Stay Informed | Security Briefing<\/title>\n<meta name=\"description\" content=\"Dive deep into various cyberattack types known until 2023. Gain insights to protect yourself and your business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-2023-ig-reszletesen-ismert-kibertamadasok-tipusai\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberattacks Types (2023) - Stay Informed | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Dive deep into various cyberattack types known until 2023. Gain insights to protect yourself and your business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-2023-ig-reszletesen-ismert-kibertamadasok-tipusai\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-07T15:46:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-31T23:46:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Types-of-known-cyberattacks-in-detail-until-2023-banner-2-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"696\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Types of known cyberattacks in detail until 2023\",\"datePublished\":\"2023-04-07T15:46:18+00:00\",\"dateModified\":\"2024-05-31T23:46:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/\"},\"wordCount\":1135,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Types-of-known-cyberattacks-in-detail-until-2023-banner-2-1.png\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/\",\"name\":\"Cyberattacks Types (2023) - Stay Informed | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Types-of-known-cyberattacks-in-detail-until-2023-banner-2-1.png\",\"datePublished\":\"2023-04-07T15:46:18+00:00\",\"dateModified\":\"2024-05-31T23:46:17+00:00\",\"description\":\"Dive deep into various cyberattack types known until 2023. Gain insights to protect yourself and your business.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Types-of-known-cyberattacks-in-detail-until-2023-banner-2-1.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Types-of-known-cyberattacks-in-detail-until-2023-banner-2-1.png\",\"width\":696,\"height\":300,\"caption\":\"Types of known cyberattacks in detail until 2023\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Types of known cyberattacks in detail until 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kibert\u00e1mad\u00e1sok t\u00edpusai (2023) - Maradj t\u00e1j\u00e9kozott | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Mer\u00fclj\u00f6n el a 2023-ig ismert k\u00fcl\u00f6nf\u00e9le kibert\u00e1mad\u00e1sok t\u00edpusai k\u00f6z\u00f6tt. Szerezzen betekint\u00e9st, hogy megv\u00e9dhesse mag\u00e1t \u00e9s v\u00e1llalkoz\u00e1s\u00e1t.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-2023-ig-reszletesen-ismert-kibertamadasok-tipusai\/","og_locale":"hu_HU","og_type":"article","og_title":"Cyberattacks Types (2023) - Stay Informed | Security Briefing","og_description":"Dive deep into various cyberattack types known until 2023. Gain insights to protect yourself and your business.","og_url":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-2023-ig-reszletesen-ismert-kibertamadasok-tipusai\/","og_site_name":"Security Briefing","article_published_time":"2023-04-07T15:46:18+00:00","article_modified_time":"2024-05-31T23:46:17+00:00","og_image":[{"width":696,"height":300,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Types-of-known-cyberattacks-in-detail-until-2023-banner-2-1.png","type":"image\/png"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"C\u00e9sar Daniel Barreto","Becs\u00fclt olvas\u00e1si id\u0151":"6 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Types of known cyberattacks in detail until 2023","datePublished":"2023-04-07T15:46:18+00:00","dateModified":"2024-05-31T23:46:17+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/"},"wordCount":1135,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Types-of-known-cyberattacks-in-detail-until-2023-banner-2-1.png","articleSection":["cybersecurity"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/","name":"Kibert\u00e1mad\u00e1sok t\u00edpusai (2023) - Maradj t\u00e1j\u00e9kozott | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Types-of-known-cyberattacks-in-detail-until-2023-banner-2-1.png","datePublished":"2023-04-07T15:46:18+00:00","dateModified":"2024-05-31T23:46:17+00:00","description":"Mer\u00fclj\u00f6n el a 2023-ig ismert k\u00fcl\u00f6nf\u00e9le kibert\u00e1mad\u00e1sok t\u00edpusai k\u00f6z\u00f6tt. Szerezzen betekint\u00e9st, hogy megv\u00e9dhesse mag\u00e1t \u00e9s v\u00e1llalkoz\u00e1s\u00e1t.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Types-of-known-cyberattacks-in-detail-until-2023-banner-2-1.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Types-of-known-cyberattacks-in-detail-until-2023-banner-2-1.png","width":696,"height":300,"caption":"Types of known cyberattacks in detail until 2023"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/types-of-known-cyberattacks-in-detail-until-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Types of known cyberattacks in detail until 2023"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar D\u00e1niel Barreto","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto elismert kiberbiztons\u00e1gi \u00edr\u00f3 \u00e9s szak\u00e9rt\u0151, aki m\u00e9lyrehat\u00f3 tud\u00e1s\u00e1r\u00f3l \u00e9s k\u00e9pess\u00e9g\u00e9r\u0151l ismert, hogy egyszer\u0171s\u00edtse a bonyolult kiberbiztons\u00e1gi t\u00e9m\u00e1kat. Kiterjedt h\u00e1l\u00f3zatbiztons\u00e1gi \u00e9s adatv\u00e9delmi tapasztalattal rendelkezik, rendszeresen k\u00f6z\u00f6l betekint\u0151 cikkeket \u00e9s elemz\u00e9seket a leg\u00fajabb kiberbiztons\u00e1gi trendekr\u0151l, oktatva mind a szakembereket, mind a nagyk\u00f6z\u00f6ns\u00e9get.","url":"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=1674"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1674\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/1689"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=1674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=1674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=1674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}