Please enable JavaScript.
Coggle requires JavaScript to display documents.
Attacks and Exploits (Network-Based Vulnerabilities (DNS cache poisoning,…
Attacks and Exploits
Social Engineering Attacks
Shoulder surfing
USB key drop
Interrogation
Motivation techniques
Elicitation
Impersonation
Phishing
Network-Based Vulnerabilities
DNS cache poisoning
Pass the hash
FTP exploits
Man-in-the-middle
SMTP exploits
DoS/stress test
SNMP exploits
NAC bypass
SMB exploits
VLAN hopping
Name resolution exploits
Wireless and RF-based Vulnerabilities
WPS implementation weakness
Bluejacking
Credential harvesting
Bluesnarfing
Fragmentation attacks
RFID cloning
Deauthentication attacks
Jamming
Evil twin
Repeating
Application-Based Vulnerabilities.
Cross-site request forgery (CSRF/XSRF)
Clickjacking
Cross-site scripting (XSS)
Security Misconfiguration
Authorization
File inclusion
Authentication
File inclusion
Injections
Local Host Vulnerabilities
Sandbox escape
Physical Device Security
Default account settings
Privilege Escalation
Unsecure Service
OS Vulnerabilities
Physical Security Attacks
Dumpster diving
Lock picking
Fence jumping
Lock bypass
Egress sensor
Piggybacking/tailgating
Badge cloning
Post-Exploitation Techniques
Persistence
Covering your tracks
Lateral movement