Common Attack Vectors

Trevor Chandler

Well-known member
Jul 4, 2020
678
629
24,221
Here are some common types of attack vectors:

- Weak or Compromised Access Credentials
- Phishing
- Malware
- Unpatched Software
- Third-party vendors & service providers
- Insider Threats
- Lack of Encryption
- Misconfigurations
- Trust Relationships
- Brute Force
- DDoS Attacks
- SQL Injections
- Cross-site scripting (XSS)
- Man-in-the-Middle (MITM)
- Session Hijacking



Got anymore to add to my list!!
 
  • Love
Reactions: precious
Here are some common types of attack vectors:

- Weak or Compromised Access Credentials
- Phishing
- Malware
- Unpatched Software
- Third-party vendors & service providers
- Insider Threats
- Lack of Encryption
- Misconfigurations
- Trust Relationships
- Brute Force
- DDoS Attacks
- SQL Injections
- Cross-site scripting (XSS)
- Man-in-the-Middle (MITM)
- Session Hijacking



Got anymore to add to my list!!
Cross site request attack
Social engineering attack
Man in the browser attack
Zero day attack
 
Here are some common types of attack vectors:

- Weak or Compromised Access Credentials
- Phishing
- Malware
- Unpatched Software
- Third-party vendors & service providers
- Insider Threats
- Lack of Encryption
- Misconfigurations
- Trust Relationships
- Brute Force
- DDoS Attacks
- SQL Injections
- Cross-site scripting (XSS)
- Man-in-the-Middle (MITM) -> now: On Path Attack for CompTIA
- Session Hijacking



Got anymore to add to my list!!
Really go in that list?
Man in the Cloud
Man in the Disk (still no nonoffensive exclusive name for these).
SMSishing

Whaling,
Qishing (Manipulating QR Codes, not new, but more and more common)
Just go to the Exam Objectives for Sec+.
 
  • Wow
Reactions: Trevor Chandler
Man in the Cloud? Man in the Disk? These haven't arrived to my knowledge base just yet!!!
you should attend one of my courses then.

Man in the Cloud: using public Cloud ressources for delivering malware or using onedrive7ggogle drive to exfiltrate data f.e.
Man in the Disk: attack vector for android with installed SD-Card

Also there is a Meet in the middle Attack, but that is for 3DES encryption.
I mention that only to confuse (no, so they have heard it sometime, if it might come up again in the future my students..

Wondering, that you to not ask about quishing....