Global Information Lookup Global Information

Attack vector information


In computer security, an attack vector is a specific path, method, or scenario that can be exploited to break into an IT system, thus compromising its security. The term was derived from the corresponding notion of vector in biology. An attack vector may be exploited manually, automatically, or through a combination of manual and automatic activity.

Often, this is a multi-step process. For instance, malicious code (code that the user did not consent to being run and that performs actions the user would not consent to) often operates by being added to a harmless seeming document made available to an end user. When the unsuspecting end user opens the document, the malicious code in question (known as the payload) is executed and performs the abusive tasks it was programmed to execute, which may include things such as spreading itself further, opening up unauthorized access to the IT system, stealing or encrypting the user's documents, etc.

In order to limit the chance of discovery once installed, the code in question is often obfuscated by layers of seemingly harmless code.[1]

Some common attack vectors:

  • exploiting buffer overflows; this is how the Blaster worm was able to propagate.
  • exploiting webpages and email supporting the loading and subsequent execution of JavaScript or other types of scripts without properly limiting their powers.
  • exploiting networking protocol flaws to perform unauthorized actions at the other end of a network connection.
  • phishing: sending deceptive messages to end users to entice them to reveal confidential information, such as passwords.
  1. ^ Provos, Niels; McNamee, Dean. "The Ghost In The Browser Analysis of Web-based Malware" (PDF) – via UseNix. {{cite journal}}: Cite journal requires |journal= (help)

and 24 Related for: Attack vector information

Request time (Page generated in 0.8125 seconds.)

Attack vector

Last Update:

In computer security, an attack vector is a specific path, method, or scenario that can be exploited to break into an IT system, thus compromising its...

Word Count : 290

SQL injection

Last Update:

mostly known as an attack vector for websites but can be used to attack any type of SQL database. SQL injection attacks allow attackers to spoof identity...

Word Count : 4166

Memcached

Last Update:

launch DDoS attacks in large scale. The memcached protocol over UDP has a huge amplification factor, of more than 51000. Victims of the DDoS attacks include...

Word Count : 1940

Vector

Last Update:

Look up vector or vectorial in Wiktionary, the free dictionary. Vector most often refers to: Euclidean vector, a quantity with a magnitude and a direction...

Word Count : 744

Computer security

Last Update:

is a man-in-the-middle attack and how can I protect my organization?". verizon.com. "Multi-Vector Attacks Demand Multi-Vector Protection". MSSP Alert...

Word Count : 22141

Common Vulnerability Scoring System

Last Update:

may be exploited and then used to attack other parts of a system or network. These new metrics allow the Base vector to more clearly express the type of...

Word Count : 2762

Watering hole attack

Last Update:

originated in Ukraine, compromised a Ukrainian government website. The attack vector was from users of the site downloading it. The malware erases the contents...

Word Count : 1504

National Vulnerability Database

Last Update:

"it may (in theory) cause a denial of service" for attacked systems, but that this attack vector "is not especially plausible". Common Weakness Enumeration...

Word Count : 529

IP fragmentation attack

Last Update:

MTU, the SDU must be fragmented. IP fragmentation attacks exploit this process as an attack vector. Part of the TCP/IP suite is the Internet Protocol...

Word Count : 2599

Attack surface

Last Update:

The attack surface of a software environment is the sum of the different points (for "attack vectors") where an unauthorized user (the "attacker") can...

Word Count : 635

Directory traversal attack

Last Update:

traversal attack vectors are open file descriptors to directories outside the jail. The working directory is another possible attack vector. Insecure...

Word Count : 1149

Psyb0t

Last Update:

vendors, including those running DD-WRT or OpenWrt firmware. The primary attack vector is SSH or telnet access. Using brute-forcing, it tries to gain access...

Word Count : 360

Juice jacking

Last Update:

the kiosk as an information tool to bring awareness of the potential attack vector and they have discussed, but not publicly released, tools to perform...

Word Count : 1719

XcodeGhost

Last Update:

harbored the malicious code. It was thought to be the "first large-scale attack on Apple's App Store", according to the BBC. The problems were first identified...

Word Count : 1704

Bitboard

Last Update:

piece attack vectors, one for file attack vectors of rooks, and one each for the diagonal and anti-diagonal attack vectors of bishops (rank attacks of rooks...

Word Count : 2990

Malvertising

Last Update:

difficulty diminishing the number of malvertising attacks, which "suggests that this attack vector isn’t likely to disappear soon." AIDS Trojan or PC...

Word Count : 2530

Resource exhaustion attack

Last Update:

of state used when necessary. File descriptor leaks are another common vector. Most general-purpose programming languages require the programmer to explicitly...

Word Count : 231

NOP slide

Last Update:

regard to the results of unaligned execution. If the input providing the attack vector into which the NOP slide and payload are to be introduced are filtered...

Word Count : 1080

Supply chain attack

Last Update:

clear this was a supply chain attack, but the attack vector used is not specified. NotPetya is classified as a ransomware attack because it encrypted the hard-drives...

Word Count : 5979

XARA

Last Update:

containing the XARA exploit from their iOS App Store. In XARA each attack vector violates the principles of a computer security sandbox. Untrusted partners...

Word Count : 392

Log4Shell

Last Update:

Protocol (IIOP). Because HTTP requests are frequently logged, a common attack vector is placing the malicious string in the HTTP request URL or a commonly...

Word Count : 3474

Aegis Combat System

Last Update:

thus incorporating anti-submarine warfare (ASW) systems and Tomahawk Land Attack Cruise Missiles (TLAM). Shipboard torpedo and naval gunnery systems are...

Word Count : 5014

AMD Platform Security Processor

Last Update:

AMD Secure Processor has been criticized by some as another possible attack vector... Werling, Christian; Buhren, Robert (24 August 2019), Dissecting the...

Word Count : 947

List of printing protocols

Last Update:

used for printers' though 'it also offers no security and is often an attack vector with printers'. AppSocket printing normally happens over port 9100....

Word Count : 764

PDF Search Engine © AllGlobal.net