hack3rs.ca network-security
/threats :: attack-vectors

analyst@hack3rs:~/threats$ ls

Network Security Threats

Each page covers a specific threat vector — why it works, what attackers do with it, what defenders should monitor, which tools help detect it, and how to reduce exposure with practical workflows.

AV-01 · Phishing and credential theft

high

Phishing works because it targets the person, not the system. Email lures, credential-harvesting pages, MFA fatigue, and session theft bypass firewalls and EDR by exploiting the authentication workflow itself.

$ action: Deploy phishing-resistant MFA, add conditional access controls, and build a fast account lock and session revocation playbook you've actually tested.

AV-02 · Exposed services and remote access weaknesses

critical

VPNs, firewalls, admin panels, RDP, SSH, and internet-facing applications are continuously scanned. Attackers don't need to know your organization to find what you've left reachable.

$ action: Maintain a live inventory of exposed services, patch aggressively starting with internet-facing systems, and lock down administrative access paths.

AV-03 · Vulnerability exploitation and misconfiguration abuse

critical

Attackers consistently exploit known weaknesses and insecure defaults, especially on public-facing systems, cloud services, and network appliances. Misconfiguration is usually the multiplier that turns a bug into a breach.

$ action: Prioritize externally exposed assets, enforce secure defaults, and validate remediation with direct testing — not just ticket status.

AV-04 · Lateral movement after initial access

high

Once inside, attackers use shared credentials, over-trusted network paths, and gaps in east-west monitoring to move across systems and escalate privileges before defenders notice.

$ action: Segment networks, reduce admin sprawl, monitor east-west traffic, and alert on abnormal authentication patterns between internal hosts.

AV-05 · Insider threat and privilege misuse

high

Insider threats include malicious employees, negligent users, and over-privileged contractors whose access can cause serious harm — intentionally or accidentally. The challenge is that insiders already have the keys.

$ action: Enforce least privilege, log sensitive actions, build separation of duties, and establish a fair, evidence-based investigation process before you need one.

AV-06 · State-backed and foreign targeted intrusions

critical

State-backed intrusions often pursue espionage, long-term access, or pre-positioning for future disruption. The tradecraft is patient and the objectives are strategic — which means defenders need longer retention, stronger fundamentals, and the ability to investigate slow campaigns.

$ action: Harden identity and edge access, protect high-value systems, extend telemetry retention, and build investigation procedures for slow campaigns — not just fast incident response.

AV-07 · Supply chain and third-party compromise

critical

Attackers target software suppliers, MSPs, and trusted access paths because one upstream compromise can open doors into dozens of downstream organizations. Defenders often trust these channels by default — which is exactly the problem.

$ action: Inventory third-party dependencies and access paths, restrict vendor privileges, verify changes against approved tickets, and monitor trusted channels the same way you monitor external threats.

AV-08 · Ransomware and data extortion operations

critical

Modern ransomware operations start long before encryption. Attackers spend days or weeks gaining access, collecting credentials, disabling defenses, and staging data before triggering the event that gets everyone's attention.

$ action: Harden identity controls and backups, detect pre-encryption staging behaviors, segment critical services, and rehearse your containment and recovery decisions before a crisis forces them.

AV-09 · DDoS and service exhaustion attacks

high

DDoS and service exhaustion attacks degrade availability by overwhelming network paths, applications, or supporting infrastructure like DNS and load balancers. The most painful incidents are the ones where mitigation services exist but slow recognition and bad runbooks prolong the outage.

$ action: Establish upstream scrubbing relationships, define rate limits and thresholds in advance, map service dependencies, and drill availability response before an incident forces improvisation.

AV-10 · Cloud misconfiguration and identity abuse

critical

Cloud environments get compromised through over-permissioned roles, leaked keys, exposed storage, and control-plane actions that look like normal admin work until they're not. The control plane itself is the attack surface.

$ action: Harden cloud identities, reduce standing privilege, monitor control-plane changes continuously, and validate exposed resources and configuration drift on a regular cadence.

AV-11 · DNS abuse, tunneling, and command-and-control

high

Attackers abuse DNS for reconnaissance, C2 beaconing, and covert data movement because DNS traffic is almost universally allowed and rarely inspected closely. Missing DNS telemetry means missing one of the best early-warning signals available.

$ action: Centralize DNS logging, baseline query behavior by host role, monitor resolver paths, and build alerts for high-entropy domains, unusual query volumes, and resolver bypass.

AV-12 · Wireless rogue access and evil twin attacks

high

Wireless environments can be abused through rogue access points, evil twin networks, and credential capture because Wi-Fi is physically accessible to anyone within radio range — and users connect by name, not by cryptographic identity.

$ action: Monitor the wireless environment for rogue SSIDs, enforce strong authentication and certificate validation, segment wireless networks by trust level, and train users to recognize trusted SSIDs and certificate prompts.