Lesson 03: Information Security Threats and Attack Vectors
3.01 Motives, Goals, and Objectives of Information Security Attacks
3.02 Top Information Security Attack Vectors
3.03 Information Security Threat Categories
3.04 Types of Attacks on a System
3.05 Information Warfare
threats - Malicious activity can be done by Attacker
Attack Vectors - way for attacker to enter
3.01 Motives, Goals, and Objectives of Information Security Attacks
1.Disturpt Business Continuity
2.Data Theft
3.Changing Data
4.Revenge
5.Organization Reputation
6.Military goal
6.Political
3.02 Top Information Security Attack Vectors
1.Cloud computing threats
software as a service - antivirus
platform - os
infrastructure - aws cloud , google cloud ,microsoft azure
2.Advanced Persistant Threats
one close , another open
3.Virus & Worms threats
4.Mobile Threats
5.Botnets threats
6.Insider Threats
3.03 Information Security Threat Categories
1.Network threats
Information gathering - version
spoofing - smtp
Man in the middle attack - http
password attacks - default passwords
DOS - Bandwidth - (Denial of service)
Firewall & IDS attacks - Intrusion Detection System
2.Host Threats (Domain)
Foot printing - tech version
Malware attacks - 0ld tech
DOS - firewall & rate limiting
Unauthorized access
Privilege Escalation
Physical Attacks
Remote code Execution
if you find PHP 8.1.0-dev then try RCE & SQLi
User-Agentt: zerodiumsleep(5);
User-Agentt: zerodiumsystem('id');
3.Application Threats
sql injection
Authentication Attack
Authorization Attack
Broken session management
Information Disclosure
Cryptography attack
Security Misconfiguration
4.People and Technology threats
3.04 Types of Attacks on a System
Operating System - unpatched system
Misconfiguration attack - database, webserver
application level attacks - sql, xss, ssrf
shrink-wrap code attacks - default configuration
3.05 Information Warfare (ICT - information Communication Technology)
offensive Information warfare - attacks, database, webserver, network, application
defensive Information warfare - IDS , Alerts , Response , threat modelling
No comments:
Post a Comment