notes
Attack vector
Initializing search
    • Obsidian Notes
    • ACL
    • AD
    • ARP
    • ASA
    • BGP
    • BYOD
    • BitLocker
    • Bluetooth
    • C2
    • CA
    • Control Panel
    • DFIR
    • DHCP
    • DNS
    • Diffie Hellman
    • Dijkstra's algorithm
    • DoS
    • EAP
    • ECC
    • EIGRP
    • Ethernet
    • FTP
    • GPO
    • HMAC
    • HSRP
    • HTTP
    • ICMP
    • IDS
    • IMAP
    • IOC
    • IP
    • IPS
    • IPsec
    • IPv4
    • IPv6
    • ISP
    • Kerberos
    • LAN
    • LDAP
    • MAC
    • MD5
    • MITM
    • ML algorithms
    • ML cheatsheet
    • ML metrics
    • ML
    • MTU
    • NAT
    • NFC
    • NIC
    • NTP
    • OS
    • OSI model
    • App design
    • Asymmetric encryption
    • Attack vector
    • Attacks
    • Backup
    • Blockchain
    • Boot integrity
    • Buffer overflow
    • Cable
    • Cisco 3 layer model
    • Cloud computing
    • Code injection
    • Collision+broadcast domains
    • Confusion matrix
    • Crypto
    • Database
    • Devices
    • Embedded systems
    • Endpoint defense
    • Eventvwr
    • Fiber optic
    • Firewall
    • Hardware
    • Hash
    • John
    • Lines
    • Linux commands
    • Linux privesc
    • Linux
    • Logging
    • Lusrmgr.msc
    • Mail
    • Malware
    • Mmc
    • Models of access control
    • Netstat
    • Network attacks
    • Network measurements
    • Networking
    • Nmap
    • Notes

    Attack vector

    • direct access
      • data centers - protect physically
      • OS - admin pass
      • keylogger
      • portable media ([[USB]])
    • wireless
      • default login creds on [[WAP]]
      • rogue access point
        • evil twin for MITM attacks
      • protocol vulns
        • [[WPA]]2 Key reinstallation acts
        • WPE
    • email attack
      • very successful
      • phishing
    • supply chain
      • underlying infra/manufacture process
      • Stuxnet, fake cisco devices
    • social media
      • [[OSINT]] -> user profiling + PII
    • removable media
      • USB
        • infect [[air gap]]ped networks, industrial systems, high-sec devices
    • cloud attack
      • public-facing apps/services
      • sec misconfig
      • brute force attacks
      • phishing users
      • orchestration attacks - make cloud make a bunch of instances
        • DoS
    Made with Material for MkDocs