2.2 common threat vectors and attack surfaces.

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/30

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

31 Terms

1
New cards

SMS (Message Vector)

fraudulent text messages with malicious links or requests

Example: Text from “bank” asking to verify info

2
New cards

Email

Attacks from ____ that are Used to send phishing, malware, or exploit links

3
New cards

Instant Messaging (IM) (Message Vector)

Malicious links via apps like Slack, Teams, WhatsApp

Example: Friend’s account sends you a suspicious link

4
New cards

Image-based (Attack Vector/Threat)

Malicious code hidden in image files | An attacker embeds JavaScript in a .png used in email phishing |

5
New cards

File-based (Attack Vector/Threat)

Files used to exploit system vulnerabilities | A malicious PDF with an embedded exploit payload |

6
New cards

Voice call (Attack Vector/Threat)

Vishing: voice phishing for credentials | "Bank" calls asking for your credit card info |

7
New cards

Removable device ((Attack Vector/Threat))

Malware delivered via USBs or external drives | Found USB stick infects PC with ransomware when plugged in |

8
New cards

Vulnerable Software

Outdated or misconfigured apps can be exploited

9
New cards

Client-based

Requires installation on user system | Old Java app with buffer overflow vulnerability

10
New cards

Agentless

Web apps that don't need installation but can be exploited remotely | Misconfigured SaaS application with weak auth |

11
New cards

Unsupported Systems/Apps

No longer receive security updates, leaving them open to attack | Windows XP PC in a hospital network being targeted |

12
New cards

Unsecure Networks

Inadequately protected network connections

13
New cards

Wireless

Easy to intercept if unencrypted | Public Wi-Fi without WPA3

14
New cards

Wired

Less targeted, but still vulnerable to physical access | Plugging into open Ethernet port in office

15
New cards

Bluetooth

Short-range wireless that can be exploited | Bluejacking or Bluesnarfing attacks on phones |

16
New cards

Open Service Ports

Unmonitored open ports allow unauthorized access | Port 22 (SSH) open to internet with default creds |

17
New cards

Default Credentials

Using manufacturer usernames/passwords that are widely known | Admin/admin on a router never changed |

18
New cards

Supply Chain

Compromise through third-party vendors or software

19
New cards

MSPs (Managed service providers)

Attackers compromise managed service providers | MSP breach gives attacker access to clients' networks

20
New cards

Vendors/Suppliers (Common Threat Vectors & Attack Surfaces)

Attackers tamper with software/hardware before delivery | SolarWinds Orion update containing backdoor |

21
New cards

Phishing (Human vector)

Deceptive emails to steal info


Example:

Email from “HR” asking to reset password

22
New cards

Vishing (human vector)

Voice phishing

Example: Robocall pretending to be from the IRS

23
New cards

Smishing (Human Vector)

SMS-based phishing

Example: Text with fake delivery notice

24
New cards

Misinformation (Human Vector)

False info spread accidentally

Example: Fake COVID-19 updates on social media

25
New cards

Disinformation (Human Vector)

False info spread intentionally

Example: Malicious actor creates fake news to influence elections

26
New cards

Impersonation (Human Vector)

Pretending to be someone trustworthy

Example: Hacker poses as CEO to get wire transfer

27
New cards

Business Email Compromise (BEC) (Human Vector)

Targeted phishing to trick employees into sending money/data

Example: Spoofed email from CFO requesting urgent invoice payment

28
New cards

Pretexting (Human Vector)

Lying to obtain information

Creating a false identity or scenario to trick someone into revealing confidential information

(example: Pretending to be IT support to get login info)

29
New cards

Watering Hole (Human Vector)

Compromising websites likely visited by target


Example: Infecting an industry forum site to target engineers

30
New cards

Brand Impersonation (Human Vector)

Faking trusted brands to gain access

Example: Spoofed PayPal login page

31
New cards

Typosquatting (Human Vector)

Registering fake URLs similar to real ones

Example: go0o0gle.com used to phish Google credentials