No standards groups for attackers exist, so not all the attacks fit neatly or clearly in one category. In fact, some attacks fit into two or more categories at the same time. Table 1-6 describes a few additional methods attackers might use.
Table 1-6 Additional Attack Methods