hack3rs.ca network-security
/threats :: attack-vectors

analyst@hack3rs:~/threats$ ls

Threats (Attack Vector Learning Library)

These pages expand the homepage attack-vector topics into a broader learning library. Each page explains why the threat exists, what attackers can do, what defenders should monitor, which tools help, and how to reduce risk with practical workflows.

AV-05 · Insider threat and privilege misuse

high

Insider threats include malicious insiders, negligent users, and over-privileged staff or contractors whose access can be misused intentionally or accidentally to expose systems, data, or operations.

$ action: Enforce least privilege, strong monitoring for sensitive actions, separation of duties, and fast access review / revocation workflows.

AV-06 · State-backed and foreign targeted intrusions

critical

State-backed or foreign-targeted intrusions often pursue espionage, strategic access, disruption, or long-term persistence, using stealthier tradecraft and patient campaign planning.

$ action: Harden identity and edge access, prioritize high-value systems, improve telemetry retention, and practice threat-informed detection and long-duration investigations.

AV-07 · Supply chain and third-party compromise

critical

Attackers target software suppliers, MSPs, integrators, and trusted update or access paths to reach downstream organizations through relationships that defenders often trust by default.

$ action: Inventory third-party dependencies and access, restrict vendor privileges, verify updates and changes, and monitor trusted channels like you monitor external threats.

AV-08 · Ransomware and data extortion operations

critical

Modern ransomware operations often combine initial access, credential abuse, lateral movement, data theft, and disruption, turning one weakness into both operational outage and extortion pressure.

$ action: Harden identity and backups, detect early staging/lateral movement, segment critical services, and rehearse containment and restoration before a crisis.

AV-09 · DDoS and service exhaustion attacks

high

Distributed denial-of-service and service exhaustion attacks aim to degrade availability by overwhelming network paths, applications, or supporting resources such as DNS, load balancers, and upstream dependencies.

$ action: Prepare upstream mitigation, rate limiting, capacity plans, and runbooks that prioritize service continuity, traffic visibility, and fast escalation.

AV-10 · Cloud misconfiguration and identity abuse

critical

Cloud environments are frequently compromised through identity mismanagement, over-permissioned roles, exposed services, and misconfigurations that create easy paths to data or control-plane access.

$ action: Harden cloud identities, reduce privilege scope, monitor control-plane changes, and continuously validate exposed resources and configuration drift.

AV-11 · DNS abuse, tunneling, and command-and-control

high

Attackers abuse DNS for reconnaissance, payload staging, command-and-control signaling, and covert data movement because DNS is widely allowed and often weakly monitored.

$ action: Centralize DNS logs, baseline query behavior, monitor resolver paths, and detect anomalous domains, query volume, and tunneling-like patterns.

AV-12 · Wireless rogue access and evil twin attacks

high

Wireless environments can be abused through rogue access points, evil twin networks, weak segmentation, and credential capture attempts when Wi-Fi visibility and policy enforcement are weak.

$ action: Monitor wireless space, enforce strong authentication, segment wireless networks, and train users to recognize trusted SSIDs and certificate prompts.