Section 3.26 Threat Vectors and Attack Surfaces Flashcards
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
Threat Vector
Means or pathway by which an attacker can gain unauthorized access to a computer or network to deliver a malicious payload or carry out an unwanted action
Think of threat vector as the “how” of an attack, whereas the attack surface is the “where” of the attack
Attack Surface
Encompasses all the various points where an unauthorized user can try to enter data to or extract data from an environment
Think of threat vector as the “how” of an attack, whereas the attack surface is the “where” of the attack
3 points RRD
How to minimse attack surface?
- Restricting access
- Removing unnecessary software
- Disabling unused protocols
6 Threat vectors that could be used to attack your enterprise network. MIFVRU
Threat vectors
- Messages: Threats delivered via email, simple message service (SMS text messaging), or other forms of instant
messaging - Images: Embedding of malicious code inside of an image file by the threat actor
- Files: The files, often disguised as legitimate documents or software, can be
transferred as email attachments, through file-sharing services, or hosted
on a malicious website - Voice calls: Vishing - Use of voice calls to trick victims into revealing their sensitive information to an attacker
- Removable devices: One common technique used with removable devices is known as baiting. Attacker might leave a malware-infected USB drive in a location where their target might find it, such as in the parking lot or the lobby of the targeted organization
- Unsecure Networks: Unsecure networks includes wireless, wired, and Bluetooth networks that lack the appropriate security measures to protect these networks
Unsecured Networks:
Wireless networks
If wireless networks are not properly secured, unauthorised individuals can intercept the wireless communications or gain access to the network
Attackers can set up rogue access points known as ‘evil twins’ to create fake wifi networks that mimic organisations legit ones. Once connnected the data can be intercepted/modified
Unsecured Networks:
Wired networks
Wired networks tend to be more secure than their wireless networks, but they are not immune to threats
Physical access to the network infrastructure can lead to various
attacks
- MAC Address Cloning
- VLAN Hopping
Bluetooth Vulnerability
By exploiting vulnerabilities in the Bluetooth protocol, an attacker can carry out their attacks using techniques like the BlueBorne or BlueSmack exploits
BlueBorne
Set of vulnerabilities in Bluetooth technology that can allow an attacker to take over devices, spread malware, or even establish an on-path attack to intercept communications without any user interaction
BlueSmack
Type of Denial of Service attack that targets Bluetooth-enabled devices by sending a specially crafted Logical Link Control and Adaptation Protocol packet to a target device