The document discusses several modes and types of hacker attacks, including spoofing, denial of service attacks, session hijacking, and buffer overflow attacks. Spoofing involves altering one's identity to masquerade as another user or system. Specific types of spoofing covered include IP, email, and web spoofing. Denial of service attacks aim to overload systems to render them unusable. Session hijacking involves taking over an active session between another user and a server. Buffer overflow attacks exploit program vulnerabilities to overwrite memory and execute malicious code.