Social Engineering Techniques
Malware Type
Network Attacks
Threat Actors
Vulnerability Types
101

Attacker calls their victim, asking about the victim's extended car warranty

Vishing

101

This malicious software encrypts the victim's data

Ransomware

101

Occurs when an attacker sends many packets with fake MAC address to overflow the switch table

MAC flooding

101

This person would attack a website that promotes the sale of animal fur.

Hacktivists

101

Opening ports that are not being used as a service on your server

Open Ports and Services


202

Attacker sends email to the IT dept. asking about their server storage.

Spear Phishing

202

This malicious software can spread without any interaction

Worm

202

An adversary sets up a fake access point to trick people into connecting to it instead of a legit one.

Evil Twin

202

This hacker is sponsored by a nation

State Actors

202

This type of vulnerability is not in documentation anywhere, until after it is used

Zero-day

303
An employee needs to swipe a badge in order to enter their building, before the door closes, the attacker enters the building.

Tailgating

303

This malicious software is lays dormant until it is triggered by an event

Logic Bomb

303

Attacker sends unsolicited message to a Bluetooth-enabled device

Bluejacking

303

This person is a disgruntled employee

Insider Threat
303

This type of vulnerability occurs when all or many accounts have root/admin privileges

Unsecured Root accounts

404

Attacker emails someone claiming to be their boss, telling the employee they need to give an account full permissions.

Impersonation

404

This malicious software gives remote access to an attacker

RAT - remote access trojan

404

Fake infomation is added to the cache of a DNS server, so that DNS queries result in incorrect replies

DNS Poisoning

404

This person can find vulnerabilities and use known exploits against the vulnerabilities.

Script Kiddie

404

This type of vulnerability occurs when you purchase equipment or applications and use them with their out of the box settings

Default Settings

505

Attacker creates a malicious website that pretends to sell baseballs to target a baseball team.

Watering Hole Attack

505

This malicious software is placed when the attacker wants a way back into their victim's environment

Backdoor

505

Attacker forces target to lose internet connection, often combined with evil twin attack

Disassociation

505

This group uses advanced tactics and techniques, their attacks often have several layers to them and may persist over a long period of time.

APT - Advanced Persistent Threat

505
This type of vulnerability occurs when systems are not updated on a regular basis

Improper or weak patch management