1. Network probes scan computer networks to gather information about services and vulnerabilities which can enable future attacks.
2. Privilege escalation attacks exploit software bugs to gain higher levels of access on a system, such as ordinary users accessing root privileges.
3. Denial of service (DoS) and distributed denial of service (DDoS) attacks aim to overwhelm network or system resources to interfere with normal operations.