Attack synonyms
Category:
Part of speech:
A rigorous or energetic effort to accomplish something difficult:
A large quantity of people or things resembling an attack.
A work stoppage (otherwise concerted stoppage of an activity) as a form of protest
To use force or threat of force to compel (another person) to submit to sexual intercourse or other sexual penetration.
offensive military operation
Offensive tactical action
Advertisement
The act by which something is stormed.
coup de main (French)
Offensive tactical action
take offensive action
To fight offensively; used of an army
To fight offensively; used of an army
advance on
To fight offensively; used of an army
To attack, damage, or destroy with or as with a torpedo
Advertisement
Expense; cost:
Self-motivation; ability coupled with ambition.
A hostile act or military attack:
(Countable, military) An attack.
A breaking out; sudden occurrence, as of disease or war
fight-back (antonym)
Advertisement
blame (related)
Responsibility for a fault or wrong
crime (related)
(Uncountable) The practice or habit of committing crimes.
An attack; assault
Using, containing, or marked by harshly critical or irate language.
The definition of a raid is a surprise attack or surprise visit, especially when done by the military during war or by police to arrest suspects.
Advertisement
The definition of a push is the act of putting pressure on someone or something to get action.
A vigorous or abusive attack in words, esp. in a newspaper
The bullets, arrows, etc. discharged in this way
(Countable) An instance of shooting (a person) with a gun.
The definition of barrage is a large volume of something, or a huge amount of things happening all at once.
Advertisement
A simultaneous or rapid and continuous discharge of many firearms
(Obsolete) A seat, especially a throne.
Fuel for a fire
The force that maintains a blockade
A structure or covering of boards
Offensive tactical action
Advertisement
Offensive tactical action
The right of a group of citizens to introduce a matter for legislation either to the legislature or directly to the voters
A military action consisting of armed forces of one geopolitical entity entering territory controlled by another such entity, generally with the objective of conquering territory or altering the established government.
An aggressive entrance into foreign territory; a raid or invasion.
forced entrance
Offensive tactical action
An orchestrated attempt to convince somebody to seek professional help and/or change their bahaviour with an addiction or other psychological problem.
Advertisement
increased presence
Offensive tactical action
An advance, especially at another's expense; an encroachment:
(Law) An unlawful diminution of the possessions of another.
US spelling of counter-attack.
Anything that gives an unflattering or damaging picture of the subject with which it is dealing
The reporting of a person to the authorities for possible criminal prosecution.
The act of blaming, criticizing, or condemning as wrong; reprehension.
Advertisement
A sudden attack, spasm, or convulsion, as in epilepsy or another disorder.
A sudden, involuntary mental experience:
A period of time spent in a particular way; a spell:
The act or situation of relapsing.
To enter by force in order to conquer or pillage:
A low-pressure atmospheric disturbance resulting in strong winds accompanied by rain, snow, or other precipitation and often by thunder and lightning.
Advertisement
To besiege by encircling, as with an army
snipe at
To fight offensively; used of an army
To attack.
pounce on
To fight offensively; used of an army
A harsh verbal or physical attack.
To accelerate the growth or progress of; to further; to forward; to help on; to aid; to heighten.
Advertisement
The definition of besiege is to surround, crowd around or overwhelm.
To form a circle around; surround:
march against
To fight offensively; used of an army
take the initiative
To fight offensively; used of an army
take-the-offensive
To fight offensively; used of an army
To attack by ambush; to waylay.
take by surprise
To fight offensively; used of an army
To fight offensively; used of an army
make a push
To fight offensively; used of an army
The definition of bombard is to attack continuously or repeatedly.
To attack, damage, or destroy with a bomb or bombs
To fall on; to experience; to suffer.
burst upon
To fight offensively; used of an army
fire the first shot
To fight offensively; used of an army
mushroom out
To fight offensively; used of an army
lay siege to
To fight offensively; used of an army
To approach someone in a very determined way.
swoop down on
To fight offensively; used of an army
launch an attack
To fight offensively; used of an army
spring on
To fight offensively; used of an army
To fight offensively; used of an army
To attack (ground troops, for example) with a machine gun or cannon from a low-flying aircraft.
To interrupt the course or progress of:
Engage is defined as to get someone interested in something or to have a conversation or discussion with someone.
tilt against
To fight offensively; used of an army
To rub on or with a stone in order to polish or sharpen.
fire at
To fight offensively; used of an army
fire on
To fight offensively; used of an army
To fight or struggle against; oppose, resist, or seek to get rid of
attempt violence to
To fight offensively; used of an army
trespass against
To fight offensively; used of an army
launch an offensive
To fight offensively; used of an army
mount an offensive
To fight offensively; used of an army
begin hostilities against
To fight offensively; used of an army
take up arms against
To fight offensively; used of an army
To do, make, or cause to move, go, or act, with unusual or excessive speed or haste; hurry
strike the first blow
To fight offensively; used of an army
To rake with gunfire.
To hit, injure, or kill with a saber.
To rush or hurry
close with
To fight offensively; used of an army
To add pepper to.
Rake is defined as to gather up, smooth over or move through.
sail into
To fight offensively; used of an army
open up on
To fight offensively; used of an army
let have it
To fight offensively; used of an army
To persuade (someone) to engage, esp. for the first time, in illicit or unsanctioned sexual intercourse
(Baseball) To hit (a ball) with a quick short swing.
(Football) To kick the ball
To strike repeatedly.
To attack:
To steal (a child)
To join or combine for a common purpose; form a club.
To plunge (a pointed weapon or instrument) into something.
knock unconscious
To assault; used of an individual
throw oneself on
To assault; used of an individual
throw oneself upon
To assault; used of an individual
lift a hand against
To assault; used of an individual
(American football) to bring a ball carrier to the ground
To assault; used of an individual
To assault; used of an individual
lower the boom on
To assault; used of an individual
go-for-the-jugular
(Idiomatic) To exert an unrestrained, aggressive effort, especially by assailing an opponent's or victim's area of greatest vulnerability.
1857, "The Leary Man", in Anglicus Ducange, The Vulgar Tongue
To denounce is defined as to take a public stand against something and make clear you don't like or are condemning it.
To analyze and judge as a critic
To assail (someone) from an unseen or unexpected direction
To implement, to employ, to put into use.
set-to-work
(Intransitive, idiomatic) To begin working.
start in on
To proceed vigorously
Undertake means to start something or agree to do something.
(Idiomatic) To confront or deal with directly; to commence a confrontation.
To proceed vigorously
plunge into
To proceed vigorously
dive into
To proceed vigorously
wade into
To proceed vigorously
withdrawal (antonym)
Discontinuance of the use of a drug or other substance, especially one that is addictive.
retreat (antonym)
(Chess) The move of a piece from a threatened position.
defense (antonym)
A plan or system for defending
resist (antonym)
To take action in opposition to; try to eliminate, reduce, or stop:
illness (related)
A disease.
Very aggressive
Tending to denounce.
en-garde
Of, pertaining to, causing or accompanied by paroxysms
The ability or right to approach, enter, exit, communicate with, or make use of:
A quick, brilliant, and highly successful act; a triumph.
coup de main
A sudden action undertaken to surprise an enemy.
An abusive, bitter, attack, or criticism: denunciation.
A sudden raid or military advance.
oppugnancy
The act of oppugning; opposition; resistance
The definition of a paroxysm is a sudden attack that happens periodically from a disease or illness.
(By extension) Any tirade or declamation full of bitter condemnation.
Polemic is a controversy, debate or dispute, or a person who is inclined to argue.
The act or practice of forcibly seizing an enemy's goods or citizens in retaliation for a loss or injury inflicted.
Violent response to an act of harm or perceived injustice.
A quick witticism; bright retort; quip
(Military) A concentrated fire from pieces of artillery, as in endeavoring to make a break in a fortification; a volley.
(Military) An offensive military mission. Used originally to mean an attack from a fortress, but most commonly used today to describe a single mission by a military aircraft.
A long, vehement speech, esp. one of denunciation; harangue
Sustained, harshly critical language; invective.
To judicially or publicly charge one with a criminal offense.
To startle from quiet; to alarm.
The definition of assay is to test or survey, especially to determine the quantity of metal that a mixture has or to test a medicine.
To bash is to hit very hard or to say unkind things about someone or something.
To engage in or as if in battle.
To have a first part or element
To punish or rebuke severely.
To strive in opposition or against difficulties; struggle:
To do away with completely; put an end to:
To try to overcome; struggle against or contend with
To become worn away or tattered along the edges.
(Obs.) To attack physically
Insult is defined as to speak with rudeness or to say something to offend.
To make a violent verbal attack; talk or write bitterly (against); rail
The definition of maim is to mutilate or injure in a way that limits full use of the body.
To oppose with argument; criticize adversely; call in question
To take part in a skirmish
To utter a slanderous statement
(Figuratively) To defeat overwhelmingly.
To hit or propel (a ball, for example) with a smoothly regulated swing.
Thrust is defined as to quickly push with force.
To take pains:
flight (antonym)
A flight arrow
protection (antonym)
The process of keeping (something or someone) safe.
shelter (antonym)
Something that covers or protects; protection, or place affording protection, as from the elements or danger
support (antonym)
Financial or other help.
sustenance (antonym)
Something that sustains something else; essential support:
resistance (antonym)
aid (antonym)
The act or result of helping; assistance:
submission (antonym)
(Law) An agreement whereby parties to a dispute submit the matter to arbitration and agree to be bound by the decision
surrender (antonym)
(Insurance) The voluntary abandonment of a policy by an insured person in return for a cash payment (surrender value), thus freeing the company of liability
protect (antonym)
To swing at a pitch so as to give (a base runner) a better chance of advancing.
sustain (antonym)
Sustain is defined as to support something or to endure a trial or hardship.
submit (antonym)
To allow oneself to be subjected to something:
withstand (antonym)
To withstand is to be able to successfully cope with something or to be able to resist or remain unaffected by something.
be lazy (antonym)
set to work
slough off (antonym)
set to work
To experience; to suffer; to fall upon.
To set upon with violent force
sail in
To start work on vigorously
An attack; an assault:
The method used in dealing with or accomplishing:
A path that something or someone moves along.
A plan of construction; plan of making or doing
A way of doing or accomplishing something
The definition of a plan is a document, program or diagram that shows how to proceed.
A particular method for performing a task.
The part of a sail, such as the weather clew of a course, to which this rope is fastened.
(Uncountable) Practical ability in some given field or practice, often as opposed to creativity or imaginative skill. [from 19th c.]
A period or turn of work, duty, etc.
hop-to-it
attack (related)
The definition of attack is to make an attempt to hurt someone or something (physically or verbally), to destroy someone or something, to impact someone or something in a dangerous manner, or to forcibly take someone or something.
work (related)
Followed by with. General use, said of either fellow employees or instruments or clients.
To hit heavily and repeatedly with violent blows.
active attacks (related)
The term attack can be used in a number of ways, from the more general meaning of an attempt by a cracker to break into a computer to deface a home page or to install a virus on a computer to the more technical information security approach of the term, meaning an attack to a cryptosystem. In the latter usage, a security professional is suggesting that a cracker is searching for weaknesses in the computer system that will allow him or her to decrypt encrypted information in that system. The term attack can be used in a number of ways, from the more general meaning of an attempt by a cracker to break into a computer to deface a home page or to install a virus on a computer to the more technical information security approach of the term, meaning an attack to a cryptosystem. In the latter usage, a security professional is suggesting that a cracker is searching for weaknesses in the computer system that will allow him or her to decrypt encrypted information in that system. The various types of attacks on computer systems are many and include the following: passive attacks, which, when using sniffers, can take place by eavesdropping and may not be detected; active attacks, which require some interaction such as altering data and can be detected; remote attacks, which do not occur on-site; a hit-and-run ping of death attack, which crashes a computer; a smurf or persistent attack, which affects the target’s machine for a limited amount of time—and then lets it return to normal; a replay attack, which is an active attack whereby the cracker tries to capture message parts and then resend a message sometime later with changes; a brute-force attack, which is a fatiguing attempt to try all combinations until a successful break-in occurs; a man-in-the-middle attack, which involves either eavesdropping on an existing connection or interposing oneself in the middle of a connection and changing data; a hijack attack, which literally hijacks one side of a connection; and rewrite attacks, which change an encrypted message without first decrypting it. Targeted attacks that have the goal of taking over control of a computer system typically contain five distinct phases. In the reconnaissance phase, the attacker tries to find potential candidates for an attack; he or she gathers information about the infrastructure of a network, the people involved in using and managing the network, and the computers attached to it. The second phase includes a scan of the system or a range of systems for vulnerabilities. In the third phase, the vulnerabilities are exploited, either by gaining access to the system or denying service to it. In the fourth phase, the attacker uses a variety of methods to gain access by installing a back door listener, a RootKit, or a Kernel-level RootKit. The last phase of an attack typically involves the attacker’s covering his or her tracks so that the administrator of a computer system would find it difficult to detect that the system has been compromised. Graham, R. Hacking Lexicon. [Online, 2001.] Robert Graham Website. http://www.linuxsecurity.com/resource_files/documentation/hacking-dict.html.
back or trap door (related)
The term attack can be used in a number of ways, from the more general meaning of an attempt by a cracker to break into a computer to deface a home page or to install a virus on a computer to the more technical information security approach of the term, meaning an attack to a cryptosystem. In the latter usage, a security professional is suggesting that a cracker is searching for weaknesses in the computer system that will allow him or her to decrypt encrypted information in that system. The term attack can be used in a number of ways, from the more general meaning of an attempt by a cracker to break into a computer to deface a home page or to install a virus on a computer to the more technical information security approach of the term, meaning an attack to a cryptosystem. In the latter usage, a security professional is suggesting that a cracker is searching for weaknesses in the computer system that will allow him or her to decrypt encrypted information in that system. The various types of attacks on computer systems are many and include the following: passive attacks, which, when using sniffers, can take place by eavesdropping and may not be detected; active attacks, which require some interaction such as altering data and can be detected; remote attacks, which do not occur on-site; a hit-and-run ping of death attack, which crashes a computer; a smurf or persistent attack, which affects the target’s machine for a limited amount of time—and then lets it return to normal; a replay attack, which is an active attack whereby the cracker tries to capture message parts and then resend a message sometime later with changes; a brute-force attack, which is a fatiguing attempt to try all combinations until a successful break-in occurs; a man-in-the-middle attack, which involves either eavesdropping on an existing connection or interposing oneself in the middle of a connection and changing data; a hijack attack, which literally hijacks one side of a connection; and rewrite attacks, which change an encrypted message without first decrypting it. Targeted attacks that have the goal of taking over control of a computer system typically contain five distinct phases. In the reconnaissance phase, the attacker tries to find potential candidates for an attack; he or she gathers information about the infrastructure of a network, the people involved in using and managing the network, and the computers attached to it. The second phase includes a scan of the system or a range of systems for vulnerabilities. In the third phase, the vulnerabilities are exploited, either by gaining access to the system or denying service to it. In the fourth phase, the attacker uses a variety of methods to gain access by installing a back door listener, a RootKit, or a Kernel-level RootKit. The last phase of an attack typically involves the attacker’s covering his or her tracks so that the administrator of a computer system would find it difficult to detect that the system has been compromised. Graham, R. Hacking Lexicon. [Online, 2001.] Robert Graham Website. http://www.linuxsecurity.com/resource_files/documentation/hacking-dict.html.
kernel (related)
(Calculus) A function used to define an integral transform.
man-in-the-middle attack (related)
The term attack can be used in a number of ways, from the more general meaning of an attempt by a cracker to break into a computer to deface a home page or to install a virus on a computer to the more technical information security approach of the term, meaning an attack to a cryptosystem. In the latter usage, a security professional is suggesting that a cracker is searching for weaknesses in the computer system that will allow him or her to decrypt encrypted information in that system. The term attack can be used in a number of ways, from the more general meaning of an attempt by a cracker to break into a computer to deface a home page or to install a virus on a computer to the more technical information security approach of the term, meaning an attack to a cryptosystem. In the latter usage, a security professional is suggesting that a cracker is searching for weaknesses in the computer system that will allow him or her to decrypt encrypted information in that system. The various types of attacks on computer systems are many and include the following: passive attacks, which, when using sniffers, can take place by eavesdropping and may not be detected; active attacks, which require some interaction such as altering data and can be detected; remote attacks, which do not occur on-site; a hit-and-run ping of death attack, which crashes a computer; a smurf or persistent attack, which affects the target’s machine for a limited amount of time—and then lets it return to normal; a replay attack, which is an active attack whereby the cracker tries to capture message parts and then resend a message sometime later with changes; a brute-force attack, which is a fatiguing attempt to try all combinations until a successful break-in occurs; a man-in-the-middle attack, which involves either eavesdropping on an existing connection or interposing oneself in the middle of a connection and changing data; a hijack attack, which literally hijacks one side of a connection; and rewrite attacks, which change an encrypted message without first decrypting it. Targeted attacks that have the goal of taking over control of a computer system typically contain five distinct phases. In the reconnaissance phase, the attacker tries to find potential candidates for an attack; he or she gathers information about the infrastructure of a network, the people involved in using and managing the network, and the computers attached to it. The second phase includes a scan of the system or a range of systems for vulnerabilities. In the third phase, the vulnerabilities are exploited, either by gaining access to the system or denying service to it. In the fourth phase, the attacker uses a variety of methods to gain access by installing a back door listener, a RootKit, or a Kernel-level RootKit. The last phase of an attack typically involves the attacker’s covering his or her tracks so that the administrator of a computer system would find it difficult to detect that the system has been compromised. Graham, R. Hacking Lexicon. [Online, 2001.] Robert Graham Website. http://www.linuxsecurity.com/resource_files/documentation/hacking-dict.html.
passive attacks (related)
The term attack can be used in a number of ways, from the more general meaning of an attempt by a cracker to break into a computer to deface a home page or to install a virus on a computer to the more technical information security approach of the term, meaning an attack to a cryptosystem. In the latter usage, a security professional is suggesting that a cracker is searching for weaknesses in the computer system that will allow him or her to decrypt encrypted information in that system. The term attack can be used in a number of ways, from the more general meaning of an attempt by a cracker to break into a computer to deface a home page or to install a virus on a computer to the more technical information security approach of the term, meaning an attack to a cryptosystem. In the latter usage, a security professional is suggesting that a cracker is searching for weaknesses in the computer system that will allow him or her to decrypt encrypted information in that system. The various types of attacks on computer systems are many and include the following: passive attacks, which, when using sniffers, can take place by eavesdropping and may not be detected; active attacks, which require some interaction such as altering data and can be detected; remote attacks, which do not occur on-site; a hit-and-run ping of death attack, which crashes a computer; a smurf or persistent attack, which affects the target’s machine for a limited amount of time—and then lets it return to normal; a replay attack, which is an active attack whereby the cracker tries to capture message parts and then resend a message sometime later with changes; a brute-force attack, which is a fatiguing attempt to try all combinations until a successful break-in occurs; a man-in-the-middle attack, which involves either eavesdropping on an existing connection or interposing oneself in the middle of a connection and changing data; a hijack attack, which literally hijacks one side of a connection; and rewrite attacks, which change an encrypted message without first decrypting it. Targeted attacks that have the goal of taking over control of a computer system typically contain five distinct phases. In the reconnaissance phase, the attacker tries to find potential candidates for an attack; he or she gathers information about the infrastructure of a network, the people involved in using and managing the network, and the computers attached to it. The second phase includes a scan of the system or a range of systems for vulnerabilities. In the third phase, the vulnerabilities are exploited, either by gaining access to the system or denying service to it. In the fourth phase, the attacker uses a variety of methods to gain access by installing a back door listener, a RootKit, or a Kernel-level RootKit. The last phase of an attack typically involves the attacker’s covering his or her tracks so that the administrator of a computer system would find it difficult to detect that the system has been compromised. Graham, R. Hacking Lexicon. [Online, 2001.] Robert Graham Website. http://www.linuxsecurity.com/resource_files/documentation/hacking-dict.html.
ping of death attack (related)
The term attack can be used in a number of ways, from the more general meaning of an attempt by a cracker to break into a computer to deface a home page or to install a virus on a computer to the more technical information security approach of the term, meaning an attack to a cryptosystem. In the latter usage, a security professional is suggesting that a cracker is searching for weaknesses in the computer system that will allow him or her to decrypt encrypted information in that system. The term attack can be used in a number of ways, from the more general meaning of an attempt by a cracker to break into a computer to deface a home page or to install a virus on a computer to the more technical information security approach of the term, meaning an attack to a cryptosystem. In the latter usage, a security professional is suggesting that a cracker is searching for weaknesses in the computer system that will allow him or her to decrypt encrypted information in that system. The various types of attacks on computer systems are many and include the following: passive attacks, which, when using sniffers, can take place by eavesdropping and may not be detected; active attacks, which require some interaction such as altering data and can be detected; remote attacks, which do not occur on-site; a hit-and-run ping of death attack, which crashes a computer; a smurf or persistent attack, which affects the target’s machine for a limited amount of time—and then lets it return to normal; a replay attack, which is an active attack whereby the cracker tries to capture message parts and then resend a message sometime later with changes; a brute-force attack, which is a fatiguing attempt to try all combinations until a successful break-in occurs; a man-in-the-middle attack, which involves either eavesdropping on an existing connection or interposing oneself in the middle of a connection and changing data; a hijack attack, which literally hijacks one side of a connection; and rewrite attacks, which change an encrypted message without first decrypting it. Targeted attacks that have the goal of taking over control of a computer system typically contain five distinct phases. In the reconnaissance phase, the attacker tries to find potential candidates for an attack; he or she gathers information about the infrastructure of a network, the people involved in using and managing the network, and the computers attached to it. The second phase includes a scan of the system or a range of systems for vulnerabilities. In the third phase, the vulnerabilities are exploited, either by gaining access to the system or denying service to it. In the fourth phase, the attacker uses a variety of methods to gain access by installing a back door listener, a RootKit, or a Kernel-level RootKit. The last phase of an attack typically involves the attacker’s covering his or her tracks so that the administrator of a computer system would find it difficult to detect that the system has been compromised. Graham, R. Hacking Lexicon. [Online, 2001.] Robert Graham Website. http://www.linuxsecurity.com/resource_files/documentation/hacking-dict.html.
replay attack (related)
(Computer science, security) An attempt to subvert security by recording legitimate communications and repeating them to try to impersonate a valid user.
smurf (related)
(Computing, security) A smurf attack
vulnerabilities of computers (related)
The term attack can be used in a number of ways, from the more general meaning of an attempt by a cracker to break into a computer to deface a home page or to install a virus on a computer to the more technical information security approach of the term, meaning an attack to a cryptosystem. In the latter usage, a security professional is suggesting that a cracker is searching for weaknesses in the computer system that will allow him or her to decrypt encrypted information in that system. The term attack can be used in a number of ways, from the more general meaning of an attempt by a cracker to break into a computer to deface a home page or to install a virus on a computer to the more technical information security approach of the term, meaning an attack to a cryptosystem. In the latter usage, a security professional is suggesting that a cracker is searching for weaknesses in the computer system that will allow him or her to decrypt encrypted information in that system. The various types of attacks on computer systems are many and include the following: passive attacks, which, when using sniffers, can take place by eavesdropping and may not be detected; active attacks, which require some interaction such as altering data and can be detected; remote attacks, which do not occur on-site; a hit-and-run ping of death attack, which crashes a computer; a smurf or persistent attack, which affects the target’s machine for a limited amount of time—and then lets it return to normal; a replay attack, which is an active attack whereby the cracker tries to capture message parts and then resend a message sometime later with changes; a brute-force attack, which is a fatiguing attempt to try all combinations until a successful break-in occurs; a man-in-the-middle attack, which involves either eavesdropping on an existing connection or interposing oneself in the middle of a connection and changing data; a hijack attack, which literally hijacks one side of a connection; and rewrite attacks, which change an encrypted message without first decrypting it. Targeted attacks that have the goal of taking over control of a computer system typically contain five distinct phases. In the reconnaissance phase, the attacker tries to find potential candidates for an attack; he or she gathers information about the infrastructure of a network, the people involved in using and managing the network, and the computers attached to it. The second phase includes a scan of the system or a range of systems for vulnerabilities. In the third phase, the vulnerabilities are exploited, either by gaining access to the system or denying service to it. In the fourth phase, the attacker uses a variety of methods to gain access by installing a back door listener, a RootKit, or a Kernel-level RootKit. The last phase of an attack typically involves the attacker’s covering his or her tracks so that the administrator of a computer system would find it difficult to detect that the system has been compromised. Graham, R. Hacking Lexicon. [Online, 2001.] Robert Graham Website. http://www.linuxsecurity.com/resource_files/documentation/hacking-dict.html.
tone-beginning
a decisive manner of beginning a musical tone or phrase
plan of attack
ideas or actions intended to deal with a problem or situation
A rapid, persistent chemical change that releases heat and light and is accompanied by flame, especially the exothermic oxidation of a combustible substance:
Flak is defined as the bursting shells shot at aircraft from enemy guns on the ground, or criticism or opposition.
A violent explosion, as of dynamite or a bomb.
To become round or plump
air attack (related)
bombing (related)
air-strike (related)
counter-attack (related)
surprise attack (related)
attacks (related)
cyber attack (related)
escalade
The act of scaling or climbing the walls of a fortified place by ladders
To make a fierce verbal attack
To shoot snipe.
The process whereby some area of land or procedure becomes controlled by the military or administered in a military fashion.
warmaking
(Intransitive, of an intravenous needle) To move from a vein, remaining in the body.
run at
To fight offensively; used of an army
Shell means to fire explosives from a large gun or guns.
go over the top
To fight offensively; used of an army
Molest is defined as to harm, or to make unwanted sexual advances, or to sexually assault.
Synonym Study
- Bombard means to attack with artillery or bombs, and in figurative use suggests persistent, repetitious action to bombard a speaker with questions
- Storm suggests a rushing, powerful assault that is stormlike in its action and effect
- Beset implies an attack or onset from all sides beset with fears
- Assault implies a sudden, violent attack or onslaught and suggests direct contact and the use of force
- Assail means to attack by or as if by repeated blows or thrusts assailed by reproaches
- Attack implies vigorous, aggressive action, whether in actual combat or in an undertaking to attack a city, to attack a problem
Find another word for attack. In this page you can discover 296 synonyms, antonyms, idiomatic expressions, and related words for attack, like: lunge, assault, onslaught, strike, open-fire, rape, offensive military operation, storming, coup de main (French), onrush and take offensive action.