77 - Other Attack Vectors

Impersonation

Posing as someone to gain unauthorized access

Do ut des

Mutual exchange of favors to gain trust or favorability and attack

Quid Pro Quo

Offering compensation or a service in exchange for access

Spoofing

Manipulation of data so that it appears as if it's coming from a legitimate source
Types of spoofing:

  • Identity
  • Email
  • IP
  • Website