OBJECTIVE 2.2 Explain

Explain common threat vectors and attack surfaces

A threat vector is the path an attacker uses to reach a target. The attack surface is the total set of all possible entry points. Reducing attack surface and hardening vectors is foundational defense.

Message-Based Vectors

Email

The most exploited vector in cybersecurity. Period.

  • Phishing: Mass emails impersonating legitimate entities to steal credentials or deliver malware
  • Spear-phishing: Targeted phishing aimed at specific individuals with personalized content
  • Whaling: Spear-phishing targeting executives (CEO, CFO)
  • Business Email Compromise (BECBusiness Email Compromise — Impersonating executives to authorize fraudulent transfers): Attacker compromises or impersonates a business email to authorize fraudulent transfers
  • Malicious attachments: Weaponized Office docs (macro-enabled), PDFs, archive files
  • Malicious links: URLs leading to credential harvesting pages or drive-by download sites

SMS (Smishing)

Phishing via text message. Exploits trust in SMSShort Message Service — Text messaging on mobile networks and mobile-first behavior.

  • Fake shipping notifications, bank alerts, MFAMulti-Factor Authentication — Requiring multiple authentication factors codes
  • Often includes shortened URLs to hide the destination

Instant Messaging

Phishing via Slack, Teams, Discord, WhatsApp.

  • Exploits implicit trust within internal communication platforms
  • Compromised accounts send malicious links to colleagues

Image-Based Vectors

  • Malicious code embedded in image metadata (EXIF) or pixel data
  • Steganographic payloads — data hidden in images that appears normal
  • Exploits in image parsers (buffer overflows triggered by malformed image files)

File-Based Vectors

  • Infected documents, executables, scripts distributed via email, file shares, downloads
  • Polyglot files: files that are valid as multiple formats simultaneously (e.g., a file that’s both a valid PDF and a valid ZIP)
  • Living-off-the-land: malicious scripts using built-in tools (PowerShell, bash) rather than dropped executables

Voice-Based (Vishing)

Social engineering over phone calls.

  • Pretexting as ITInformation Technology — Broad term for computing infrastructure and services support, bank, government agency
  • Deepfake voice technology makes impersonation more convincing
  • Often combined with other vectors (call follows a phishing email to add urgency)

Removable Media

  • USBUniversal Serial Bus — Standard connector for peripherals drives (dropped in parking lots, mailed to employees)
  • USBUniversal Serial Bus — Standard connector for peripherals Rubber Ducky / BadUSB: Devices that appear as USBUniversal Serial Bus — Standard connector for peripherals drives but act as keyboards, injecting keystrokes
  • Optical media, SD cards, external hard drives
  • Exam tip: Removable media policies (disable autorun, restrict USBUniversal Serial Bus — Standard connector for peripherals ports, endpoint DLPData Loss Prevention — Prevents unauthorized data exfiltration) are the primary defense

Unsecure Networks

Wireless

  • Evil twin: Rogue access point mimicking a legitimate network name (SSIDService Set Identifier — Wireless network name)
  • Rogue APAccess Point — Device providing wireless network connectivity: Unauthorized access point connected to the corporate network
  • Deauthentication attacks: Forcing clients off legitimate APAccess Point — Device providing wireless network connectivity to capture handshakes or redirect to evil twin
  • Bluetooth attacks: Bluejacking (unsolicited messages), Bluesnarfing (data theft)

Wired

  • Physical access to network jacks in lobbies, conference rooms, unsecured areas
  • Network taps and inline devices
  • ARPAddress Resolution Protocol — Maps IP addresses to MAC addresses poisoning on the local network

Vulnerable Software

Client-Based

  • Unpatched browsers, email clients, office suites
  • Browser extensions with excessive permissions
  • Software supply chain attacks (compromised update mechanisms)

Agentless

  • Vulnerabilities in network services that don’t require software installation on the target
  • Exploiting exposed management interfaces, APIs, web applications

Open Service Ports

  • Every open port is a potential entry point
  • Common targets: RDPRemote Desktop Protocol — Port 3389. Microsoft remote access (3389), SSHSecure Shell — Port 22. Encrypted remote administration protocol (22), SMBServer Message Block — Port 445. Windows file sharing protocol (445), HTTPHypertext Transfer Protocol — Port 80. Web protocol (unencrypted)/S (80/443)
  • Unnecessary services = unnecessary attack surface. If it’s not needed, disable it.

Default Credentials

  • Factory-set usernames and passwords on routers, switches, cameras, IoTInternet of Things — Connected devices (cameras, sensors, appliances) devices
  • Publicly documented and actively scanned by automated tools
  • Exam staple: Default credentials are one of the most common and easily preventable vectors

Supply Chain Vectors

Managed Service Providers (MSPs)

  • Compromise the MSPManaged Service Provider — Third party managing IT services → gain access to all their clients
  • MSPs have privileged access across multiple organizations
  • SolarWinds attack was a supply chain attack through a managed ITInformation Technology — Broad term for computing infrastructure and services tool

Vendors

  • Third-party software, hardware, or services that become the attack path
  • Pre-installed malware on hardware (documented cases with firmware implants)
  • Compromised software updates (SolarWinds Orion, Codecov, Kaseya VSA)

Suppliers

  • Upstream component providers whose compromise cascades downstream
  • Hardware supply chain: tampered chips, intercepted shipments
  • Open source dependencies: malicious packages in npm, PyPI, etc.

Human Vectors

Social Engineering

The art of manipulating people into breaking security procedures.

  • Phishing — Broad deception via electronic communication
  • Pretexting — Creating a fabricated scenario to extract information
  • Impersonation — Posing as someone with authority (ITInformation Technology — Broad term for computing infrastructure and services admin, executive, vendor)
  • Watering hole — Compromising websites the target frequently visits
  • Typosquatting — Registering domains that mimic legitimate ones (gogle.com)
  • Brand impersonation — Fake login pages, spoofed emails matching corporate branding

Misinformation/Disinformation

  • Manipulating information to influence behavior
  • Fake security alerts that trick users into installing “fixes” (malware)

Social Engineering Comparison

CompTIA loves “compare and contrast” on social engineering techniques:

TechniqueMethodWhat Attacker WantsKey Indicator
PhishingMass emailCredentials, malware installGeneric greeting, urgency, mismatched URLs
Spear-phishingTargeted email to specific personCredentials, targeted data accessPersonalized, references real projects/people
WhalingSpear-phishing targeting executivesWire transfers, strategic dataImpersonates board member, legal, or CFO
VishingPhone callInformation, credentials, wire transferCaller ID spoofing, authority/urgency
SmishingSMSShort Message Service — Text messaging on mobile networks/textClick link, install app, credentialsShortened URLs, delivery/banking themes
PretextingFabricated scenario (any channel)Information, access, trustElaborate backstory, builds rapport first
ImpersonationPosing as authority figurePhysical access, information, complianceUniform, badge, confidence
Watering holeCompromise frequently visited websiteMalware delivery to specific groupTarget-relevant website, drive-by download
TyposquattingFake domain (gogle.com)Credentials, malwareURLUniform Resource Locator — Web address for accessing resources looks almost right, login page clone
TailgatingFollowing authorized person through doorPhysical accessNo badge, “hands full” excuse
Shoulder surfingWatching someone enter credentialsCredentials, PINsPerson positioned to see screen/keypad
Dumpster divingSearching discarded materialsDocuments, credentials, intelN/A (physical)

Social Engineering Decision Logic

If the scenario describes…The technique is…
”CEO received personalized email referencing board meeting”Whaling (spear-phishing targeting executive)
“All employees received email about password reset”Phishing (mass, untargeted)
“Attacker called ITInformation Technology — Broad term for computing infrastructure and services help desk posing as new employee”Vishing + pretexting
”Fake website registered as arnazon.comTyposquatting
”Attacker infected a security blog popular with the target org’s team”Watering hole
”Person followed employee through badge-controlled door”Tailgating

Attack Surface Management

The total attack surface = all possible vectors combined. Reducing it is a continuous process:

  • Asset inventory — Can’t protect what you don’t know about
  • Vulnerability scanning — Find what’s exposed
  • Patch management — Close known holes
  • Network segmentation — Limit blast radius
  • Principle of least functionality — Disable everything that’s not needed
  • Regular review — Attack surface changes with every new system, user, or integration

Offensive Context

An attacker’s reconnaissance phase maps exactly to this objective — they’re looking for the easiest vector with the highest payoff. Automated scanners test default credentials and open ports. OSINTOpen Source Intelligence — Intelligence gathered from publicly available sources reveals the org’s technology stack. Supply chain analysis identifies trusted third parties that might be softer targets. The defender’s job is to see their organization through the attacker’s eyes and make every vector as expensive as possible.

LABS FOR THIS OBJECTIVE