Modern Attack Vectors

Security

Social Engineering

Psychological Triggers

  • Authority: Impersonating figures of authority
  • Urgency: Creating false time pressure
  • Social Proof: “Everyone else is doing it”
  • Scarcity: Limited-time offers or exclusive access
  • Likability: Building rapport and trust
  • Fear: Threatening negative consequences

Attack Techniques

Phishing Variants

  • Traditional Phishing: Mass email campaigns
  • Spear Phishing: Targeted attacks on specific individuals
  • Whaling: Targeting high-value executives
  • Business Email Compromise (BEC): Internal email account compromise
  • Vishing: Voice-based phishing (phone calls)
  • Smishing: SMS-based phishing

Advanced Impersonation

  • Brand Impersonation: Mimicking trusted organizations
  • Typosquatting: Registering similar domain names
  • Deepfakes: AI-generated audio/video content
  • AI-Enhanced Attacks: Personalized, contextually-aware attacks

Watering Hole Attacks

  • Method: Compromise websites frequented by targets
  • Target: Specific organizations or user groups
  • Payload: Drive-by downloads, credential harvesting

Technical Attacks

Injection Attacks

SQL Injection

  • Mechanism: Malicious SQL code in user inputs
  • Impact: Database compromise, data exfiltration
  • Prevention:
    • Parameterized queries/prepared statements
    • Input validation and sanitization
    • Least privilege database accounts
    • Web Application Firewalls (WAF)

Cross-Site Scripting (XSS)

  • Types:
    • Reflected XSS: Malicious script in URL parameters
    • Stored XSS: Persistent malicious scripts in database
    • DOM-based XSS: Client-side script manipulation
  • Prevention:
    • Input validation and output encoding
    • Content Security Policy (CSP)
    • Secure coding practices

Command Injection

  • Mechanism: Executing system commands through application inputs
  • Prevention: Input validation, secure API usage, sandboxing

Network Attacks

Man-in-the-Middle (MitM)

  • Variants:
    • Wi-Fi Eavesdropping: Fake access points
    • SSL/TLS Hijacking: Certificate manipulation
    • ARP Poisoning: Local network manipulation
    • DNS Spoofing: Redirecting domain resolution
  • Prevention: Strong encryption, certificate pinning, VPNs

Denial of Service (DoS/DDoS)

  • Types:
    • Volumetric: Overwhelming bandwidth
    • Protocol: Exploiting network protocol weaknesses
    • Application Layer: Targeting specific services
  • Mitigation:
    • Rate limiting
    • Content Delivery Networks (CDN)
    • DDoS protection services
    • Network segmentation

Advanced Persistent Threats (APT)

Characteristics

  • Stealth: Avoiding detection for extended periods
  • Persistence: Maintaining access through system changes
  • Reconnaissance: Extensive target information gathering
  • Lateral Movement: Spreading through internal networks

Tactics, Techniques, and Procedures (TTPs)

  • Initial Access: Phishing, supply chain, zero-day exploits
  • Execution: PowerShell, scripting, living-off-the-land
  • Persistence: Registry modification, scheduled tasks
  • Privilege Escalation: Vulnerability exploitation, credential theft
  • Defense Evasion: Anti-forensics, encryption, legitimate tools
  • Credential Access: Password attacks, keylogging
  • Discovery: Network scanning, system enumeration
  • Lateral Movement: Remote services, internal spear phishing
  • Collection: Screen capture, data staging
  • Exfiltration: Encrypted channels, legitimate services

Found this guide helpful? Share it with your team:

Share on LinkedIn