Skip to main content

Attack Vectors

What Is an Attack Vector?

The path or method an attacker uses to gain unauthorized access to a system or network.


Network-Based Threats

Wired Network Threats

ThreatDescription
Rogue devicesUnauthorized hubs, switches, or computers plugged into the network
On-path (MITM)Intercepting and potentially modifying traffic between two parties
ARP poisoningLinking attacker’s MAC to victim’s IP — redirects local traffic
MAC spoofingChanging MAC address to impersonate a device or bypass filtering
802.1X bypassExploiting misconfigured NAC to gain access
Replay attacksCapturing and retransmitting valid auth tokens

Wireless Threats

ThreatDescription
Evil twin APRogue AP mimicking a legit SSID — captures credentials
Deauth attackForcing clients off the network via 802.11 deauthentication frames
WPA2 crackingPMKID attack or capturing handshake for offline brute force
SSID spoofingBroadcasting same SSID as legit network
WardrivingMapping wireless networks from a moving vehicle
Captive portal attackFake Wi-Fi portal harvesting credentials
# Evil twin / deauth (for authorized testing only)
airmon-ng start wlan0
airodump-ng wlan0mon
aireplay-ng --deauth 0 -a <BSSID> wlan0mon

Bluetooth Threats

ThreatDescription
BluejackingSending unsolicited messages via Bluetooth
BluesnarfingUnauthorized access to data (contacts, messages) via Bluetooth
BluebuggingTaking control of device via Bluetooth
KNOB attackForcing weak encryption keys on BT connection

Removable Media Threats

USB Attacks

AttackDescription
USB drop attackLeaving infected USB drives in parking lots / offices
Rubber DuckyUSB device that emulates a keyboard — injects keystrokes
BadUSBReprogrammed USB firmware to act as HID or network adapter
Keylogger (hardware)Physical device between keyboard and computer
Juice jackingMalicious USB charging cable/station exfiltrates data
USB drop attack psychology:
- Labeled "Payroll Q4" or "Confidential"
- Relies on curiosity + lack of policy awareness
Defense: Disable AutoRun, block USB via GPO/endpoint policy

Data Exfiltration via Removable Media

- Copying sensitive files to USB
- Burning to optical media
- Using personal smartphones as storage devices
Mitigation: DLP software, endpoint USB blocking, monitoring alerts

Supply Chain Attacks

Compromising the software, hardware, or services an organization relies on — attacking the supplier rather than the target directly.

Types:
- Software supply chain: Injecting malware into updates or libraries
- Hardware supply chain: Tampering with devices before delivery
- Managed service provider (MSP) compromise: Attacker pivots from MSP to all clients

Notable Examples

IncidentMethod
SolarWinds (2020)Malicious code injected into Orion software update
NotPetya (2017)Spread via compromised Ukrainian accounting software (M.E.Doc)
XZ Utils (2024)Backdoor inserted into open-source compression library
Codecov (2021)Compromised CI/CD script leaked environment secrets

Defenses

- Software Bill of Materials (SBOM) — inventory all dependencies
- Code signing — verify integrity of software updates
- Vendor risk management — assess third-party security posture
- Zero trust — don't implicitly trust third-party software
- Monitor for unexpected outbound traffic from tools

Other Attack Vectors

VectorDescription
Direct-accessPhysical access to a device — boot from USB, bypass login
Shadow ITUnauthorized apps/services that bypass security controls
Misconfigured servicesOpen S3 buckets, exposed admin panels, default credentials
Unpatched softwareKnown CVEs exploited before patches applied
Third-party APIsInsecure integrations exposing backend data