Domain 2.0 of Security+ SY0-701 (22% of the exam). Understand how attackers think, what techniques they use, and how to defend against them — from phishing emails to SQL injection.
You can't defend what you don't understand. Security professionals study attacks not to become criminals — but to think like an adversary and build better defenses. Every defense strategy is a response to a known attack technique.
Lockheed Martin's 7-stage model describes how attacks unfold. Breaking any link in the chain stops the attack. Click each stage:
Gathering info about the target. OSINT, Google dorking, LinkedIn harvesting, Shodan, DNS enumeration. Defense: Minimize public footprint, monitor for data leaks.
Creating the attack package — pairing an exploit with a payload. Crafting a malicious PDF, building a phishing page, writing exploit code. Defense: Threat intelligence, sandbox analysis.
Sending the weapon to the target — phishing email, malicious USB, watering hole website, compromised software update. Defense: Email filtering, web proxies, user training.
Triggering the vulnerability — user clicks the link, macro executes, buffer overflow fires, SQL injection executes. Defense: Patching, ASLR/DEP, input validation, sandboxing.
Establishing persistence — installing backdoor, rootkit, creating new admin account, scheduled tasks, registry keys. Defense: EDR, application whitelisting, integrity monitoring.
Malware phones home to attacker's server for instructions. Protocols: HTTPS, DNS tunneling, social media dead drops. Defense: Network monitoring, DNS filtering, egress filtering.
The attacker's goal — data exfiltration, ransomware deployment, lateral movement, destruction, espionage. Defense: DLP, network segmentation, encryption at rest, backups.
See attacks in action in these safe sandboxes. No real systems are harmed.
Type a username into this "login form." Try normal input first, then
try: ' OR 1=1 -- or ' UNION SELECT * FROM users --
SELECT * FROM users WHERE username = '___' AND password = '___'
Type a "comment" into this guestbook. Try: <img src=x onerror="alert('XSS')"> or <script>document.cookie</script>
See how password length and complexity affect cracking time. The
password is pass. Click Start.
Examine this suspicious email. Click on each element to flag it as suspicious or mark it safe. Can you spot all the red flags?
Dear Customer,
We have detected unusual sign-in activity on your Microsoft 365 account. Multiple failed login attempts were recorded from an unrecognized device in Moscow, Russia.
Please verify your identity immediately to prevent account suspension:
Failure to verify within 24 hours will result in permanent account deletion and loss of all data.
Best regards,
Microsft Security Operations Center
© 2025
Microsoft Corporation
All certification names are referenced for educational purposes only. This project is not affiliated with any certification body.