Common Threat Vectors

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/11

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

Managed-based Vectors

  • Malicious Links

  • SMS

  • Phishing

    • Social Engineering

2
New cards

Image-based Vectors

  • Inject code in SVG images (XML)

  • Avoid by using input validation

    (Stops malicious code)

3
New cards

File-based Vectors

  • Adobe PDF

    • Contains other objects

  • Zip/Rar files

    • May contain more bad files

  • Microsoft Office

    • Macros to grab personal info / add files

4
New cards

Voice Call Vectors

  • Vishing

  • Spam over IP (Spam Calls)

  • Ware Dialing

    • Finding unpublished numbers to give access to systems

  • Call Tampering (DOS attack)

5
New cards

Removable device Vectors

  • USB

    • Malicious software

    • Bypass firewall

    • Data extraction

    • Act as keyboard

6
New cards

Client-based Vulnerable Software Vectors (USER)

  • Infected executable

  • Require constant updates

7
New cards

Agentless Vulnerable Software Vectors (Non-EXE)

  • Compromised software

8
New cards

Unsupported Systems vectors

  • Patching

  • Outdated OS

  • Single System

9
New cards

Unsecure Network Vectors

  • Wireless Security Protocol

    • WEP, WPA, WPA2 = OUTDATED

    • WPA3 = Up to Date

  • Wired

    • 802.1x = Good authentication protocol

10
New cards

Open service ports

  • Use firewall to track open ports

  • 3rd party may be able to gain access through app vulnerability

11
New cards

Default Credentials

  • Change Default Credentials (IOT Devices)

12
New cards

Supply Chain Vectors

  • Tamper with manufacturer devices

  • Gain access to network using vendor

  • Fake equipment