Skip to main content

Questions tagged [attack-vector]

Attack vectors are methods and channels used by attackers during a hacking attempt.

2 votes
1 answer
76 views

I recently had to look into some USB-related vulnerabilities and was surprised to see that in NIST's NVD analysis the attack vector was stated as "Network" (AV:N) for CVSS 3.1. Examples are ...
raner's user avatar
  • 153
2 votes
2 answers
199 views

Let's assume that the only attack to be feared on a computer is one via the network in which the machine is embedded. What options does an attacker have if the machine has no open incoming ports? (For ...
fkarger's user avatar
  • 21
2 votes
2 answers
366 views

Suppose a wifi router has a strong admin password, updated firmware and no vulnerability then - Is the router safe from malware infection from Android phones connected to it? Can malware from an ...
Ajay's user avatar
  • 51
-1 votes
1 answer
139 views

I'm looking to shift my job / skillset over to the cyber security field. I'm currently in the script kiddy stages of my knowledge and wanted to move past this and locate/identify vulnerabilities ...
Wubs's user avatar
  • 9
1 vote
0 answers
123 views

My company is looking to allow Google Chrome to self-update, a necessity as we are finding it difficult to keep up with their release cycle in order to mitigate vulnerabilities. On the pro side, ...
JohnyD's user avatar
  • 179
0 votes
2 answers
214 views

There are many talks about why someone should not use WPS because of the attacks it allows. But does it also prevent attacks? For example, if guests want to join my network instead of giving these ...
WEs's user avatar
  • 1
0 votes
1 answer
241 views

I am writing an app that serves images to clients. The app is written mostly in python. I store the images in AWS s3 and serve the clients them directly from there. Am I vulnerable to buffer overflow ...
Dr J's user avatar
  • 1
0 votes
0 answers
302 views

I'm currently doing research on evasion attacks that seek to bypass a Deep-learning based Network Intrusion Detection System. In order to achieve this, I need to know what the constraints are for the ...
Gints Engelen's user avatar

15 30 50 per page
1
2 3 4 5
11