This study guide provides an exhaustive review of threat vectors, social engineering techniques, and system vulnerabilities as outlined in the CompTIA Security+ SY0-701 exam objectives. It is designed to help both beginners and experienced practitioners synthesize complex security concepts through detailed analysis and real-world comparisons.
1. Understanding Threat Vectors
A threat vector (or attack vector) is the specific method or path an attacker uses to gain unauthorized access to a system. Attackers spend significant time discovering new vectors or exploiting unknown ones to circumvent security measures.
Messaging and Media Vectors
Attackers frequently exploit trust in communication systems to deliver malicious payloads.
- Email: The most common vector. Attackers send malicious links or phishing pages to entice users to provide credentials or install malware.
- SMS (Short Message Service): Known as Smishing. Attackers send text messages with urgent prompts (e.g., fake delivery issues) to get users to click malicious links.
- Instant/Direct Messaging: Direct communication allows attackers to build rapport and entice users to click links they would normally avoid.
- Images (SVG): Scalable Vector Graphics are XML-based files. Because browsers interpret the XML, attackers can embed HTML or JavaScript within the image description, potentially executing a cross-site scripting (XSS) attack when the image is viewed.
File-Based Vectors
Malware is not limited to executable (.exe) files; it can be hidden in various formats:
- PDFs: These act as "holding places" for text, images, and even scripts, making them ideal for hiding malicious code.
- Compressed Files (.zip, .rar): Attackers use compression to obfuscate hundreds or thousands of files, hiding one malicious file among many.
- Office Documents: Files like Word or Excel can contain macros. While often benign, malicious macros can be scripted to steal personal data.
2. Social Engineering and Impersonation
Social engineering relies on human psychology rather than technical exploits to bypass security.
Methods of Deception
Impersonation and Identity Fraud
Attackers pretend to be someone of authority (a VP or Help Desk agent) to build trust or use intimidation.
- Eliciting Information: The attacker uses a story to get the victim to provide details they shouldn't, such as bank account or Social Security numbers.
- Identity Fraud: Using a victim's private info to open credit cards, bank accounts, or apply for government benefits (tax fraud).
Real-World Comparison: Think of impersonation like a "Trojan Horse." The attacker doesn't break down the front door; they dress up as a delivery person or a high-ranking official and are simply let in by someone who trusts their disguise.
3. Application and Memory Attacks
When software runs, it moves from storage into the system's memory (RAM). Attackers target this transition.
Memory Injections
Malware can either run as its own process or inject itself into a legitimate, existing process.
- DLL Injection: A Dynamic-Link Library is an external code module that processes use. An attacker places a malicious DLL on a system and forces a legitimate process to load it.
- Privilege Escalation: By injecting into a high-priority process, the malware gains the same rights and permissions as that process, allowing it to bypass standard user restrictions.
4. Physical and Infrastructure Vectors
Even the most expensive digital defenses can be bypassed by physical or infrastructure weaknesses.
- USB Drives: Attackers leave infected USB drives in parking lots (a "Human-Interface Device" attack). If a user plugs it in, the drive can act as a keyboard and automatically type commands. This is highly effective against air-gapped networks (networks not connected to the internet).
- Unsupported Systems: Legacy operating systems that no longer receive security patches from the manufacturer are massive risks.
- Wireless Infrastructure: Using outdated protocols like WEP or WPA2 makes a network vulnerable. Upgrading to WPA3 and using 802.1X (authentication requiring credentials for network access) is recommended.
- Default Credentials: Many routers and devices ship with "admin/admin" logins. Attackers use sites like routerpasswords.com to find these defaults.
5. Advanced Attack Strategies
Watering Hole Attacks
Instead of attacking a secure organization directly, the attacker "poisons" a third-party website that the organization's employees frequently visit (like a local sandwich shop or a specific industry forum).
- Mechanism: The attacker infects the third-party site with malicious code (like JavaScript).
- Defense: Defense in Depth (layered security) is required. Even if a firewall lets the traffic through, an Intrusion Prevention System (IPS) or Antivirus may catch the malicious code.
Supply Chain Attacks
Attackers gain access through the vendors or service providers a company trusts.
- MSP (Managed Service Provider): If an attacker breaches the MSP, they have a direct line into all the MSP’s clients.
- Counterfeit Hardware: Fake hardware (like imitation network switches) may contain pre-installed vulnerabilities or malicious software.
As technology evolves, the "human element" remains the most consistent vulnerability in any security posture. Whether through a fake text message or a poisoned website, attackers rely on curiosity, urgency, and trust to bypass the most sophisticated firewalls.
Could you spot a pretexting attempt if it came from a "colleague" in another department today?






Top comments (0)