Threat Vectors 2.2 Flashcards
A […] is the method used by a threat actor to gain access to your systems
Threat Vector
A […] vector involves the use of email or SMS texts
Ex:
- Bogus Links
- Phishing Attacks
Message-Based Vector
An […] uses an image to initiate an attack
It does this by embedding a script inside the images XML (the image description), which runs when the image is opened.
Image-Based Vector
A […] initiates attacks through the use of files (.exe, .PDF, ZIP/RAR)
File-Based Vector
A […] initiates attacks through the phone
(Vishing = Phishing over the phone)
Voice Call Vector
A […] initiates attacks through a USB or other detachable peripherals
Removable Device Vecorr
A […] initiates attacks through an unpatched piece of software
Vulnerable Software Vectors
An […] initiates attacks through a legacy OS or piece of equipment, which no longer receives support / security updates
Unsupported System Vector
An […] initiates attacks through the network
Ex:
- Outdated security protocols
- Rogue APs
- No 802.1x
- Bluetooth Reconnaissance
Insecure Network Vector
An […] initiates attacks through the network
Ex:
- Outdated security protocols
- Rogue APs
- No 802.1x implemented
- Bluetooth reconnaissance
Unsecure Network Vector
[…] allow an attacker to gain access to the network, and can be prevented by implementing firewall rules
Open Service Ports
[…] allows an attacker to easily gain access to a system, unless it is changed to something more secure
Default Credentials
[…] initiates attacks by tampering with equipment, usually as it’s manufactured.
Ex:
- MSP is attacked and the attacker now has access to the networks the MSP supports
- Gain access to a network through a vendor (Jump from HVAC network to Main Network)
- Fake Cisco switches
Supply Chain Vector