Questions tagged [attack-vector]
Attack vectors are methods and channels used by attackers during a hacking attempt.
157 questions
2 votes
1 answer
76 views
CVSS 3.1 Rating and Attack Vector for USB-based Vulnerabilities
I recently had to look into some USB-related vulnerabilities and was surprised to see that in NIST's NVD analysis the attack vector was stated as "Network" (AV:N) for CVSS 3.1. Examples are ...
2 votes
2 answers
199 views
Attack surface when no incoming port is open [closed]
Let's assume that the only attack to be feared on a computer is one via the network in which the machine is embedded. What options does an attacker have if the machine has no open incoming ports? (For ...
2 votes
2 answers
366 views
Malware infection to wifi router from Android phone
Suppose a wifi router has a strong admin password, updated firmware and no vulnerability then - Is the router safe from malware infection from Android phones connected to it? Can malware from an ...
-1 votes
1 answer
139 views
Cyber Security skills development advice [closed]
I'm looking to shift my job / skillset over to the cyber security field. I'm currently in the script kiddy stages of my knowledge and wanted to move past this and locate/identify vulnerabilities ...
1 vote
0 answers
123 views
Does Google Update perform cryptographic checks against releases?
My company is looking to allow Google Chrome to self-update, a necessity as we are finding it difficult to keep up with their release cycle in order to mitigate vulnerabilities. On the pro side, ...
0 votes
2 answers
214 views
What type of attack does WPS prevent?
There are many talks about why someone should not use WPS because of the attacks it allows. But does it also prevent attacks? For example, if guests want to join my network instead of giving these ...
0 votes
1 answer
241 views
Does limiting size of images prevents buffer overflow?
I am writing an app that serves images to clients. The app is written mostly in python. I store the images in AWS s3 and serve the clients them directly from there. Am I vulnerable to buffer overflow ...
0 votes
0 answers
302 views
What happens if a sender changes the TCP window size over multiple packets that have the same ACK number?
I'm currently doing research on evasion attacks that seek to bypass a Deep-learning based Network Intrusion Detection System. In order to achieve this, I need to know what the constraints are for the ...