MODULE 07 — THREATS & ATTACKS

Threats, Vulnerabilities & Mitigations

Domain 2.0 of Security+ SY0-701 (22% of the exam). Understand how attackers think, what techniques they use, and how to defend against them — from phishing emails to SQL injection.

Why Study Attacks?

You can't defend what you don't understand. Security professionals study attacks not to become criminals — but to think like an adversary and build better defenses. Every defense strategy is a response to a known attack technique.

Ethics reminder: Never use attack techniques against systems you don't own or have explicit written permission to test. Knowledge is for defense.

Key Terms

Threat: Any potential danger that could exploit a vulnerability and cause harm to a system or data.
Vulnerability: A weakness in a system that can be exploited by a threat — software bugs, misconfigurations, weak passwords.
Exploit: Code or technique that takes advantage of a specific vulnerability to gain access or cause damage.
Mitigation: Actions taken to reduce the risk or impact of a threat — patching, encryption, access controls.
Attack Vector: The path or method used to deliver an attack — email, USB, web form, network protocol.
Attack Surface: The total number of points where an attacker could try to enter — open ports, APIs, user inputs.

The Cyber Kill Chain

Lockheed Martin's 7-stage model describes how attacks unfold. Breaking any link in the chain stops the attack. Click each stage:

1
Reconnaissance

Gathering info about the target. OSINT, Google dorking, LinkedIn harvesting, Shodan, DNS enumeration. Defense: Minimize public footprint, monitor for data leaks.

2
Weaponization

Creating the attack package — pairing an exploit with a payload. Crafting a malicious PDF, building a phishing page, writing exploit code. Defense: Threat intelligence, sandbox analysis.

3
Delivery

Sending the weapon to the target — phishing email, malicious USB, watering hole website, compromised software update. Defense: Email filtering, web proxies, user training.

4
Exploitation

Triggering the vulnerability — user clicks the link, macro executes, buffer overflow fires, SQL injection executes. Defense: Patching, ASLR/DEP, input validation, sandboxing.

5
Installation

Establishing persistence — installing backdoor, rootkit, creating new admin account, scheduled tasks, registry keys. Defense: EDR, application whitelisting, integrity monitoring.

6
Command & Control (C2)

Malware phones home to attacker's server for instructions. Protocols: HTTPS, DNS tunneling, social media dead drops. Defense: Network monitoring, DNS filtering, egress filtering.

7
Actions on Objectives

The attacker's goal — data exfiltration, ransomware deployment, lateral movement, destruction, espionage. Defense: DLP, network segmentation, encryption at rest, backups.

Attack Taxonomy

Social Engineering
  • Phishing — deceptive emails/messages
  • Spear phishing — targeted at individuals
  • Whaling — targeting executives
  • Vishing — voice phishing calls
  • Pretexting — fabricated scenario
  • Tailgating — physical access bypass
Application Attacks
  • SQL Injection — manipulate database queries
  • XSS — inject malicious JavaScript
  • CSRF — forge authenticated requests
  • Buffer Overflow — overwrite memory
  • Directory Traversal — access files outside root
  • LDAP/XML Injection — inject into parsers
Network Attacks
  • Man-in-the-Middle — intercept traffic
  • ARP Spoofing — fake ARP replies
  • DNS Poisoning — corrupt DNS cache
  • DDoS — flood with traffic
  • SYN Flood — exhaust TCP connections
  • Replay Attack — reuse captured data
Malware
  • Ransomware — encrypt files for payment
  • Trojan — disguised as legitimate software
  • Worm — self-propagating malware
  • Rootkit — hides deep in OS
  • Spyware/Keylogger — steals information
  • RAT — remote access trojan

Security+ Exam Focus (Domain 2.0 — 22%)

Interactive Attack Simulators

See attacks in action in these safe sandboxes. No real systems are harmed.

SQL Injection Sandbox

See how unsanitized input leads to data theft

Type a username into this "login form." Try normal input first, then try: ' OR 1=1 -- or ' UNION SELECT * FROM users --

🌐 Login Form (vulnerable)
⚡ SQL Query Generated
SELECT * FROM users WHERE username = '___' AND password = '___'
📋 Database Table: users
idusernamerole
1adminadministrator
2jsmithuser
3dbadmindba
4svc_backupservice

XSS (Cross-Site Scripting) Playground

See how injected scripts execute in the browser

Type a "comment" into this guestbook. Try: <img src=x onerror="alert('XSS')"> or <script>document.cookie</script>

💬 Post a Comment (vulnerable)
🌐 Rendered Page (what the victim sees)
Comments will appear here...

Brute Force Visualizer

Watch a password attack in real-time

See how password length and complexity affect cracking time. The password is pass. Click Start.

🔐 Target: SSH Login
📊 Stats
Attempts:0
Status:Idle
Current try:

Phishing Email Analyzer

Examine this suspicious email. Click on each element to flag it as suspicious or mark it safe. Can you spot all the red flags?

Click elements to flag them. 0/8 red flags found

Attack ↔ Defense Matcher

Match each attack to its best defense
Score: 0/0

Knowledge Check

All certification names are referenced for educational purposes only. This project is not affiliated with any certification body.