Preparation
Packet manipulation
Wireless intrusions
Bluetooth barrages
Network access altercations
Internet incursions
Transport raids
Application layer hacks
Name resolution skirmishes
Active directory run-ins
Distinctive drives
Some overviews, creative hacks, tools, tips and codes.
Because they do not fit into the other categories or span several of them.
On-path attack
Port redirection
Router compromise
Virtual host confusion attack
Hijack BGP