1/12
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Vector: Email
📧 The #1 delivery method for phishing, malware, and BEC.
Vector: SMS Texting
📱 The delivery method for Smishing.
Vector: Instant Messaging
💬 Using apps like Teams or WhatsApp to send malicious links or files.
Vector: Image Based
🖼 Hiding a malicious payload inside an image (steganography) or a link in an image.
Vector: File Based
📄 A malicious payload delivered in a document (e.g., a macro in an Excel file) or a script.
Vector: Voice Call
📞 The delivery method for Vishing.
Vector: Removable Device
💾 Using a USB drive to deliver malware. (e.g., "Baiting" - leaving a drive in a parking lot).
Attack Surface: Vulnerable Software
💻 Unpatched OS/apps, misconfigurations, and software bugs.
Attack Surface: Unsupported Systems
⏳ End-of-Life (EOL) hardware or software that no longer receives security patches. A massive vulnerability.
Attack Surface: Unsecure Networks
📡 Any network that allows for eavesdropping. (e.g., Public Wi-Fi, Bluetooth, unencrypted wired traffic).
Attack Surface: Open Service Ports
🚪 A service (like SSH, RDP, Telnet) listening for connections. If unneeded or unpatched, it's a huge vulnerability.
Attack Surface: Default Credentials
🔑 Using the factory-set username/password (e.g., admin/password). A common IoT and router vulnerability.
Vector: Supply Chain
🤝 An attack vector that compromises a trusted vendor (e.g., an MSP, software supplier) to attack their customers.