44 min read

> "Know your enemy and know yourself, and in a hundred battles you will never be in peril." — Sun Tzu, The Art of War, circa 5th century BCE

Learning Objectives

  • Classify threat actors by motivation, capability, and targeting patterns
  • Navigate and apply the MITRE ATT&CK framework to real-world scenarios
  • Map attacks to the Cyber Kill Chain and identify defensive opportunities at each stage
  • Identify and categorize the most prevalent attack vectors in modern environments
  • Explain the fundamentals of threat intelligence and its role in offensive security
  • Analyze the ShopStack e-commerce environment from a threat actor's perspective
  • Connect threat landscape knowledge to penetration testing methodology

Chapter 2: Threat Landscape and Attack Taxonomy

"Know your enemy and know yourself, and in a hundred battles you will never be in peril." — Sun Tzu, The Art of War, circa 5th century BCE

Chapter Overview

On December 13, 2020, the cybersecurity firm FireEye published a blog post that would shake the foundations of global cybersecurity. A sophisticated threat actor — later attributed to Russia's SVR intelligence service — had compromised SolarWinds, a company whose Orion network monitoring software was used by over 30,000 organizations, including multiple U.S. federal agencies, Fortune 500 companies, and critical infrastructure providers. The attackers had inserted a carefully crafted backdoor into a routine software update that was then distributed to approximately 18,000 customers. The operation had been running undetected for at least nine months.

The SolarWinds attack did not exploit a single vulnerability in a single system. It subverted the entire software supply chain, weaponizing the trust that organizations placed in a legitimate vendor. Understanding how this attack worked — and why it succeeded — requires a structured understanding of the modern threat landscape: who attacks, why they attack, how they attack, and what they are after.

In this chapter, we will build that understanding. We will classify threat actors by their motivations and capabilities. We will learn two foundational frameworks — MITRE ATT&CK and the Cyber Kill Chain — that give us a shared language for describing attacks. We will survey the most common attack vectors that ethical hackers must understand and test for. We will introduce ShopStack, our second running example — a young e-commerce startup with a very different risk profile from MedSecure. And we will explore the fundamentals of threat intelligence, the discipline that turns raw data about threats into actionable knowledge.

By the end of this chapter, you will see the digital world differently. Every network, every application, every user will exist within a threat landscape that you can analyze, categorize, and — most importantly — test against.


2.1 The Modern Threat Landscape

The threat landscape of the mid-2020s is more complex, more dangerous, and more consequential than at any previous point in computing history. Several converging trends have created this reality.

2.1.1 Scale and Interconnection

The number of devices connected to the Internet has exceeded 30 billion, and the amount of data generated daily is measured in exabytes. Every connected device, every API endpoint, every cloud service is a potential target. The attack surface is not just growing — it is accelerating. The explosion of IoT devices, cloud services, remote work infrastructure, and mobile applications has created an environment where organizations often do not even know the full extent of their own attack surface.

2.1.2 Professionalization of Cybercrime

Cybercrime has matured from lone hackers into a professionalized ecosystem with its own supply chains, service providers, and market dynamics. The Ransomware-as-a-Service (RaaS) model allows technically unsophisticated criminals to deploy sophisticated ransomware by purchasing access from developers who take a percentage of the ransom. Initial Access Brokers sell compromised credentials and VPN access to the highest bidder. Bulletproof hosting providers offer infrastructure that is resistant to law enforcement takedown.

Chainalysis estimated that ransomware payments exceeded $1 billion in 2023, and that figure represents only the ransoms actually paid — the total economic impact including downtime, recovery costs, and reputational damage is many times higher.

2.1.3 Geopolitical Dimension

Cyberspace has become a domain of geopolitical competition. Nation-states invest billions in offensive cyber capabilities, conducting espionage, sabotage, and influence operations. The line between state-sponsored and criminal hacking has blurred, with some governments tolerating or actively collaborating with cybercriminal groups that target foreign adversaries.

2.1.4 AI-Augmented Threats

The rise of generative AI has added new dimensions to the threat landscape. Large language models can generate convincing phishing emails at scale, create deepfake audio and video for social engineering, and assist in malware development. While AI also strengthens defenses, the asymmetry favors attackers in the near term — crafting a convincing phishing email is easier than detecting one.

2.1.5 Regulatory and Accountability Shift

Governments worldwide are increasing cybersecurity regulation and enforcement. The EU's NIS2 Directive, the SEC's cybersecurity disclosure rules, Australia's Security of Critical Infrastructure Act, and similar legislation are creating new obligations — and new consequences for failure. This regulatory environment is a major driver of demand for ethical hacking services.

📊 Real-World Application: According to Verizon's 2024 Data Breach Investigations Report (DBIR), the three most common patterns in breaches were system intrusion (complex, multi-step attacks), basic web application attacks, and social engineering. Credentials were compromised in 50% of breaches, and the exploitation of vulnerabilities as an initial access vector increased by 180% compared to the previous year. These statistics directly inform what ethical hackers should focus on testing.


2.2 Threat Actor Classification

Not all threats are created equal. Understanding who might attack an organization — and why — is essential for both effective defense and realistic penetration testing. We classify threat actors along several dimensions.

2.2.1 By Motivation

Financial gain is the most common motivation for cyberattacks. Cybercriminals steal data to sell, deploy ransomware for extortion, conduct business email compromise (BEC) fraud, and exploit financial systems directly. BEC alone caused over $2.9 billion in losses reported to the FBI's IC3 in 2023.

Espionage motivates nation-state actors who seek intellectual property, diplomatic intelligence, military secrets, and strategic business information. The targets range from defense contractors to pharmaceutical companies to political organizations.

Disruption and destruction motivate some state actors (e.g., Russia's Sandworm group targeting Ukrainian power grids) and hacktivists seeking to make political statements.

Ideology drives hacktivist groups like Anonymous and its offshoots, who target organizations they view as unethical or unjust.

Curiosity and recognition motivate some individuals, particularly younger hackers who may not fully appreciate the consequences of their actions.

Revenge motivates insider threats — disgruntled employees or former employees who use their knowledge and access to harm their employer.

2.2.2 By Capability

Script kiddies use pre-built tools and exploits without deeply understanding how they work. They rely on automated scanners, publicly available exploit code, and tutorial videos. While individually unsophisticated, the sheer number of script kiddies scanning the Internet means they frequently find and exploit unpatched systems.

Skilled individuals possess genuine technical knowledge and can adapt tools, chain vulnerabilities, and develop novel attack paths. Many bug bounty hunters and independent hackers fall into this category.

Organized criminal groups operate like businesses, with developers, operators, money launderers, and customer service personnel (yes, some ransomware groups provide "support" to help victims pay). Groups like LockBit, ALPHV/BlackCat, and Clop have generated hundreds of millions in revenue.

Nation-state actors (APTs) represent the most capable threat. Groups like Russia's Cozy Bear (APT29) and Fancy Bear (APT28), China's Hafnium and APT41, North Korea's Lazarus Group, and Iran's APT33 have enormous resources, sophisticated tools, and strategic patience. They can develop zero-day exploits, conduct multi-year campaigns, and deploy capabilities that rival those of major technology companies.

Insider threats are unique because they start with legitimate access. A malicious insider — an employee, contractor, or partner — can cause disproportionate damage because they already know the systems, have valid credentials, and understand the organization's defenses.

🔴 Red Team Perspective: When you conduct a penetration test, your client has a specific threat model — the types of attackers they are most likely to face. A defense contractor faces nation-state threats. A regional hospital faces ransomware gangs. An e-commerce startup faces opportunistic criminals. Understanding your client's threat model allows you to simulate the most realistic scenarios and provide the most relevant findings. A pentest that simulates threats the client will never face is a wasted opportunity.

2.2.3 By Targeting Pattern

Opportunistic attackers scan broadly for vulnerable systems without targeting specific organizations. They exploit whatever they find. Most automated scanning, drive-by exploitation, and mass phishing campaigns are opportunistic. An opportunistic attacker does not know or care that they are scanning MedSecure's network — they simply scan entire IP ranges looking for any exploitable service. The defense against opportunistic attacks is basic hygiene: patching, strong credentials, proper configuration, and minimizing the external attack surface.

Targeted attackers choose specific victims and tailor their attacks. Spear phishing, watering hole attacks, and supply chain compromises are typically targeted. A targeted attacker researches MedSecure specifically — learning the names of executives, the technologies they use, the vendors they work with — and crafts attacks tailored to that knowledge. Defending against targeted attacks requires layered security, threat intelligence, and the assumption that basic defenses will eventually be bypassed.

Semi-targeted attackers may target a specific industry (e.g., healthcare, financial services) without targeting specific organizations. Ransomware groups often operate this way — they specialize in sectors where they believe victims are most likely to pay. A semi-targeted attacker might scan for healthcare organizations with exposed Citrix gateways, knowing that hospitals are more likely to pay ransom to restore patient care systems. This is the most common pattern for ransomware attacks against both MedSecure and similar healthcare providers.

🔗 Connection: In Chapter 1, we introduced MedSecure Health Systems as a healthcare provider. Healthcare is targeted by both opportunistic attackers (automated scanning for exposed medical devices) and semi-targeted attackers (ransomware groups specializing in healthcare). Understanding this targeting pattern shapes how we approach MedSecure's pentest: we need to test for both sophisticated, healthcare-specific threats and basic opportunistic attacks.


2.3 The Cyber Kill Chain

In 2011, Lockheed Martin published a paper introducing the "Cyber Kill Chain" — a model that describes the stages of a cyberattack from the attacker's perspective. Despite some criticism and evolution, the Kill Chain remains one of the most widely used frameworks for understanding attack progression.

2.3.1 The Seven Stages

Stage 1: Reconnaissance The attacker gathers information about the target. This includes passive activities (searching public records, social media, technical databases) and active activities (port scanning, web application crawling). The goal is to identify potential entry points and gather information that will help craft an effective attack.

Example: An attacker targeting MedSecure discovers from job postings that they use Epic Systems for their EHR and AWS for their patient portal. LinkedIn profiles reveal the names and email formats of IT staff. Shodan reveals an exposed VPN appliance.

Stage 2: Weaponization The attacker creates or selects an attack tool tailored to the identified vulnerability. This might be a malicious document that exploits a Microsoft Office vulnerability, a custom exploit for a specific software version, or a phishing page that mimics the target's VPN login.

Example: Based on the reconnaissance, the attacker crafts a phishing email that appears to come from Epic Systems, with a malicious PDF that exploits a known vulnerability in the version of Adobe Reader used by MedSecure.

Stage 3: Delivery The weapon is transmitted to the target. Common delivery mechanisms include email (phishing), web (drive-by downloads, watering holes), USB drives, and compromised third-party services.

Example: The phishing email is sent to five MedSecure IT administrators whose email addresses were harvested during reconnaissance.

Stage 4: Exploitation The weapon triggers, exploiting a vulnerability to execute code on the target system. This might be a software vulnerability, a human vulnerability (clicking a link, entering credentials), or a configuration weakness.

Example: One administrator opens the PDF. The exploit triggers, using a buffer overflow in Adobe Reader to execute arbitrary code with the administrator's privileges.

Stage 5: Installation The attacker installs a persistent mechanism — a backdoor, rootkit, or remote access tool — that ensures continued access to the compromised system even if the initial vulnerability is patched or the malicious document is deleted.

Example: The exploit downloads and installs a custom backdoor that communicates over HTTPS to blend in with normal web traffic. It persists through a registry run key and survives reboots.

Stage 6: Command and Control (C2) The compromised system establishes a communication channel back to the attacker's infrastructure. This C2 channel allows the attacker to remotely control the compromised system, exfiltrate data, and issue commands.

Example: The backdoor beacons out to a command-and-control server disguised as a legitimate content delivery network. The attacker can now remotely control the administrator's workstation.

Stage 7: Actions on Objectives With persistent access and a C2 channel, the attacker pursues their ultimate goal — data theft, ransomware deployment, sabotage, espionage, or whatever their objective may be.

Example: The attacker uses the administrator's Active Directory credentials to move laterally through MedSecure's network, eventually reaching the Epic EHR database containing patient records for 300,000 individuals.

2.3.2 Defensive Implications

The Kill Chain's primary value is defensive. Each stage represents an opportunity to detect and disrupt an attack. If you can break any link in the chain, the attack fails:

Stage Defensive Opportunity
Reconnaissance Monitor for scanning; limit public information exposure
Weaponization Difficult to observe; focus on intelligence sharing
Delivery Email filtering; web proxies; user training
Exploitation Patching; endpoint protection; application hardening
Installation Endpoint detection; application whitelisting
C2 Network monitoring; DNS filtering; egress controls
Actions on Objectives Data loss prevention; access controls; segmentation

🔵 Blue Team Perspective: The "left of boom" concept focuses on disrupting attacks in the early stages (reconnaissance through delivery) before the "explosion" of exploitation. The further left you can detect and disrupt an attack, the less damage occurs. However, defense in depth requires capabilities at every stage. If your only defense is email filtering (delivery stage) and an attacker uses a different delivery method, you need detection at the exploitation, installation, and C2 stages as well.

2.3.3 Criticisms and Limitations

The Kill Chain has been criticized for several limitations: - It assumes a linear progression, but real attacks often loop, skip stages, or operate at multiple stages simultaneously - It focuses on network-based external attacks and does not model insider threats well - It does not adequately address cloud-native attacks, supply chain attacks, or attacks on APIs - The "weaponization" stage is largely invisible to defenders, making it less actionable

Despite these criticisms, the Kill Chain remains valuable as a mental model for understanding attack flow and identifying defensive gaps.


2.4 The MITRE ATT&CK Framework

While the Kill Chain provides a high-level model of attack progression, the MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework provides a detailed, continuously updated knowledge base of real-world adversary behaviors. ATT&CK has become the de facto standard for describing and categorizing adversary behavior.

2.4.1 Structure of ATT&CK

ATT&CK is organized into three dimensions:

Tactics are the adversary's tactical objectives — the "why" of an attack technique. There are 14 tactics in the Enterprise ATT&CK matrix:

  1. Reconnaissance — Gathering information to plan an attack
  2. Resource Development — Establishing resources to support operations
  3. Initial Access — Gaining an initial foothold in the target environment
  4. Execution — Running adversary-controlled code
  5. Persistence — Maintaining access across restarts and credential changes
  6. Privilege Escalation — Gaining higher-level permissions
  7. Defense Evasion — Avoiding detection
  8. Credential Access — Stealing credentials
  9. Discovery — Understanding the target environment
  10. Lateral Movement — Moving through the environment
  11. Collection — Gathering data of interest
  12. Command and Control — Communicating with compromised systems
  13. Exfiltration — Stealing data from the target environment
  14. Impact — Disrupting availability or integrity

Techniques are the "how" — specific methods adversaries use to achieve tactics. For example, under the "Initial Access" tactic, techniques include Phishing (T1566), Exploit Public-Facing Application (T1190), Supply Chain Compromise (T1195), and others.

Sub-techniques provide even more specificity. Phishing (T1566) has sub-techniques including Spearphishing Attachment (T1566.001), Spearphishing Link (T1566.002), and Spearphishing via Service (T1566.003).

2.4.2 Procedures and Threat Groups

ATT&CK also documents specific procedures — the exact implementations that known threat groups have used. For example, APT29 (Cozy Bear) has been observed using T1566.001 (Spearphishing Attachment) by sending emails with malicious PDF attachments exploiting Adobe Reader vulnerabilities.

The framework catalogs over 140 threat groups with their known TTPs, making it invaluable for understanding how real adversaries operate.

2.4.3 ATT&CK for Penetration Testers

As an ethical hacker, ATT&CK is one of your most valuable resources:

  • Planning engagements: Map your test plan to ATT&CK techniques to ensure comprehensive coverage. If your client's threat model includes APT29, you can look up APT29's documented TTPs and simulate them.
  • Reporting findings: Map your findings to ATT&CK technique IDs for clear, standardized communication. Instead of writing "I found that the web application was vulnerable to SQL injection," write "The web application was vulnerable to SQL injection (T1190 - Exploit Public-Facing Application), allowing initial access."
  • Measuring coverage: Assess which ATT&CK techniques your test covered and which were not tested. This helps the client understand what was and was not evaluated.
  • Improving over time: Track which ATT&CK techniques have been tested across multiple engagements to identify gaps in testing coverage.

🧪 Try It in Your Lab: Visit attack.mitre.org and explore the Enterprise ATT&CK matrix. Click on a tactic (like "Initial Access"), then explore its techniques and sub-techniques. For each technique, note the "Procedure Examples" section — these show how real threat groups have used the technique. This is one of the most educational resources in cybersecurity, and it is completely free.

2.4.4 ATT&CK Navigator

The MITRE ATT&CK Navigator is a web-based tool for visualizing, annotating, and exploring ATT&CK matrices. Pentesters use the Navigator to: - Create visual "heat maps" showing which techniques were tested in an engagement - Compare an organization's detection capabilities against known threat group TTPs - Plan engagements by highlighting techniques to be tested - Identify gaps where no testing or detection capability exists

2.4.5 ATT&CK in Practice: The SolarWinds Attack

Let us map the SolarWinds attack (which we will study in detail in this chapter's case study) to ATT&CK:

  • Reconnaissance (TA0043): Identification of SolarWinds as a high-value target with widespread deployment
  • Resource Development (TA0042): Development of SUNBURST backdoor; acquisition of infrastructure mimicking legitimate services
  • Initial Access (TA0001): Supply Chain Compromise (T1195.002) — Trojanized SolarWinds Orion update
  • Execution (TA0002): The malicious DLL executed automatically as part of the Orion software
  • Persistence (TA0003): The backdoor persisted through the legitimate SolarWinds service
  • Defense Evasion (TA0005): Mimicked legitimate SolarWinds traffic; delayed execution; checked for security tools before activating
  • Credential Access (TA0006): SAML token forgery for cloud access (T1606.002)
  • Lateral Movement (TA0008): Used stolen credentials and tokens to access additional systems and cloud resources
  • Collection (TA0009): Targeted specific data of interest in compromised organizations
  • Exfiltration (TA0010): Data exfiltrated through the C2 channel

This mapping illustrates ATT&CK's power: it provides a precise, standardized vocabulary for describing even the most sophisticated attacks.

2.4.6 ATT&CK Matrices Beyond Enterprise

While we focus primarily on the Enterprise ATT&CK matrix in this book, it is worth knowing that MITRE maintains several specialized matrices:

Mobile ATT&CK catalogs adversary behavior targeting iOS and Android devices. As mobile applications become increasingly critical (MedSecure's patient app, ShopStack's buyer experience), mobile-specific attack techniques are relevant to penetration testing engagements.

ICS ATT&CK (Industrial Control Systems) covers adversary behavior in operational technology environments. For organizations like MedSecure, where networked medical devices share characteristics with industrial control systems, the ICS matrix provides additional techniques relevant to medical device security.

Cloud ATT&CK is integrated into the Enterprise matrix but covers cloud-specific techniques for AWS, Azure, GCP, and SaaS platforms. Given that both MedSecure and ShopStack rely heavily on cloud services, cloud-specific techniques are essential knowledge.

The ATT&CK framework is not static — MITRE updates it regularly based on new threat intelligence and community contributions. Making a habit of reviewing ATT&CK updates (published on the ATT&CK blog) keeps your knowledge current with the evolving threat landscape.

Understanding which matrix to reference depends on your engagement. A pentest of MedSecure's patient-facing mobile app would reference both the Enterprise and Mobile matrices. An assessment of ShopStack's AWS infrastructure would lean heavily on cloud-specific techniques within the Enterprise matrix. A security evaluation of MedSecure's networked infusion pumps might reference the ICS matrix for techniques specific to embedded and operational technology systems.

The versatility and comprehensiveness of MITRE ATT&CK is why it has become the shared language of the cybersecurity community. Learning to think in ATT&CK terminology is one of the most professionally valuable investments you can make.

Best Practice: When writing pentest reports, include ATT&CK technique IDs for every finding. This helps the client's security team immediately look up the technique, understand its broader context, and find detection recommendations. It also enables tracking of pentest coverage against the ATT&CK matrix over time.


2.5 Common Attack Vectors

An attack vector is the method or path an attacker uses to gain access to a target. Understanding common attack vectors is essential for ethical hackers because these are the pathways you will test. Let us survey the most prevalent vectors in the current threat landscape.

2.5.1 Phishing and Social Engineering

Phishing remains the most common initial access vector. According to the 2024 Verizon DBIR, phishing was involved in over 30% of breaches. Social engineering exploits human psychology rather than technical vulnerabilities.

Types of phishing: - Spear phishing: Targeted emails crafted for specific individuals, often using personal information gathered from social media or previous breaches - Whaling: Spear phishing targeting senior executives ("big fish") - Business Email Compromise (BEC): Impersonation of executives or trusted partners to authorize fraudulent transfers or share sensitive data - Smishing and vishing: Phishing via SMS and voice calls, respectively - Spearphishing via service: Using social media, messaging platforms, or collaboration tools (Slack, Teams) as delivery channels

Beyond email — broader social engineering: - Pretexting: Creating a fabricated scenario to manipulate the target (posing as IT support, a vendor, or a delivery person) - Baiting: Leaving infected USB drives or other physical devices where targets will find and use them - Tailgating/piggybacking: Following an authorized person through a secured door - Watering hole attacks: Compromising websites known to be visited by the target group

⚖️ Legal Note: Social engineering testing must be explicitly authorized in your scope document. Many organizations include social engineering in their pentests, but some do not. If your scope does not include social engineering, do not conduct phishing campaigns, make pretexting calls, or attempt physical intrusion — even if you believe it would be valuable. Always operate within your authorization.

2.5.2 Exploitation of Public-Facing Applications

Web applications, APIs, and other Internet-facing services present enormous attack surfaces. Common vulnerability classes include:

  • Injection attacks: SQL injection, command injection, LDAP injection, and NoSQL injection allow attackers to insert malicious commands into application inputs
  • Broken authentication: Weak password policies, credential stuffing, session hijacking, and flawed multi-factor authentication implementations
  • Server-Side Request Forgery (SSRF): Tricking a server into making requests to unintended locations, potentially accessing internal services
  • Insecure deserialization: Exploiting the process by which serialized data is converted back into objects to achieve remote code execution
  • API vulnerabilities: Broken Object Level Authorization (BOLA), excessive data exposure, and lack of rate limiting on APIs

The OWASP Top 10 provides a canonical list of the most critical web application security risks and is updated periodically to reflect the evolving threat landscape.

2.5.3 Exploitation of Vulnerabilities

Software vulnerabilities — bugs in code that can be exploited for unauthorized purposes — remain a major attack vector. Key concepts include:

  • CVE (Common Vulnerabilities and Exposures): A public catalog of known vulnerabilities. Each CVE has a unique identifier (e.g., CVE-2021-44228 for the Log4Shell vulnerability).
  • Zero-day vulnerabilities: Vulnerabilities that are unknown to the vendor and for which no patch exists. Zero-days are the most valuable and dangerous class of vulnerability.
  • N-day vulnerabilities: Known vulnerabilities for which patches exist but have not been applied. The "n" refers to the number of days since the patch was released. N-day exploitation is far more common than zero-day exploitation because many organizations are slow to patch.
  • CVSS (Common Vulnerability Scoring System): A standardized framework for rating vulnerability severity on a 0–10 scale.

📊 Real-World Application: The exploitation of CVE-2023-34362 (a SQL injection vulnerability in MOVEit Transfer file-sharing software) by the Clop ransomware group in mid-2023 affected over 2,600 organizations and compromised data on more than 77 million individuals. The vulnerability had a patch available, but many organizations had not applied it. This is a textbook example of N-day exploitation at scale.

2.5.4 Credential-Based Attacks

Credentials — usernames and passwords — are the keys to the digital kingdom, and their compromise is involved in roughly half of all breaches:

  • Credential stuffing: Using username/password combinations from previous breaches to attempt logins on other services. Since many people reuse passwords, this is devastatingly effective.
  • Password spraying: Trying a small number of commonly used passwords against many accounts. This avoids account lockouts that brute-force attacks trigger.
  • Brute force: Systematically trying all possible passwords. Effective against short or simple passwords, especially against services without lockout policies.
  • Pass-the-hash and pass-the-ticket: Using stolen NTLM hashes or Kerberos tickets to authenticate without knowing the plaintext password. These are critical techniques in Active Directory environments.
  • Kerberoasting: Requesting service tickets for service accounts in Active Directory and cracking them offline to obtain plaintext passwords.

2.5.5 Supply Chain Attacks

Supply chain attacks compromise a trusted third party to gain access to the ultimate target. The SolarWinds attack is the most prominent example, but supply chain attacks take many forms:

  • Software supply chain: Compromising a software vendor's build process to distribute malicious updates (SolarWinds, Codecov, 3CX)
  • Hardware supply chain: Inserting malicious components into hardware during manufacturing
  • Dependency confusion: Exploiting package managers that check public repositories before private ones, allowing attackers to register malicious packages with the same names as internal packages
  • Third-party access compromise: Compromising a vendor, contractor, or partner who has VPN access or credentials to the target environment (the Target breach of 2013 began with a compromised HVAC contractor)

2.5.6 Ransomware

Ransomware has evolved from a simple malware category into a complex criminal ecosystem:

  • Double extortion: Encrypting data AND stealing it. If the victim restores from backup instead of paying, the attacker threatens to publish the stolen data.
  • Triple extortion: Adding DDoS attacks or threats to the victim's customers/partners.
  • Ransomware-as-a-Service (RaaS): Developers create ransomware platforms and recruit "affiliates" who conduct the actual attacks. Revenue is split between the developer and the affiliate.
  • Big game hunting: Targeting large organizations with the ability to pay multi-million-dollar ransoms, as opposed to spraying ransomware indiscriminately.

🔴 Red Team Perspective: Understanding ransomware operations is essential for ethical hackers. When you conduct a pentest and gain domain admin access, your report should not just say "I compromised the domain controller." It should articulate the ransomware risk: "With domain admin access, a ransomware operator could deploy encryption across all domain-joined systems within hours, impacting approximately 3,000 endpoints. Based on the organization's revenue and comparable ransom demands, a ransom demand of $5–10 million would be plausible."

2.5.7 Insider Threats

Insider threats are particularly challenging because the attacker starts with legitimate access:

  • Malicious insiders: Employees who intentionally misuse their access for personal gain, revenge, or espionage
  • Negligent insiders: Employees who cause security incidents through carelessness — clicking phishing links, misconfiguring systems, sharing credentials
  • Compromised insiders: Employees whose credentials or systems have been compromised by external attackers, who are then used as a proxy

2.5.8 Cloud-Specific Attack Vectors

The shift to cloud computing has created new attack vectors:

  • Misconfigured storage buckets: Publicly accessible S3 buckets, Azure Blob storage, and Google Cloud Storage containers have exposed billions of records
  • IAM (Identity and Access Management) misconfiguration: Overly permissive roles, unnecessary privileges, and exposed access keys
  • Metadata service exploitation: Accessing cloud instance metadata services (IMDS) from compromised applications to steal temporary credentials
  • Serverless function vulnerabilities: Exploiting vulnerabilities in Lambda functions, Azure Functions, or Cloud Functions to access other cloud resources
  • Container escape: Breaking out of a container to access the underlying host or other containers

2.6 Introducing ShopStack

Now that we have surveyed the threat landscape, let us introduce our second running example — ShopStack — and analyze it through the lens of what we have learned.

2.6.1 Company Profile

ShopStack is a three-year-old e-commerce startup based in Austin, Texas. Founded by two former engineers from a large e-commerce company, ShopStack provides a platform for independent artisans and craftspeople to sell handmade goods directly to consumers — think Etsy meets Shopify, but focused on premium handcrafted items.

ShopStack has grown rapidly: - 85 employees (60 engineers, 10 in operations, 15 in sales/marketing) - 15,000 active sellers on the platform - 200,000 registered buyers - Processing approximately $50 million in annual transactions - Recently closed a $25 million Series B funding round

The company has a "ship fast" engineering culture. Deployments happen multiple times per day. Security is valued but often takes a back seat to feature development and growth metrics.

2.6.2 Technology Stack

ShopStack's architecture is cloud-native and modern:

Frontend: - React.js single-page application - Next.js for server-side rendering - Hosted on Vercel

Backend: - Node.js API server (Express.js framework) - GraphQL API for the marketplace - REST API for seller management tools - Microservices for payment processing, inventory, and shipping

Data: - PostgreSQL (primary database, hosted on AWS RDS) - Redis (caching and session management, AWS ElastiCache) - Elasticsearch (product search) - S3 (product images, seller documents)

Infrastructure: - AWS (primary cloud provider) - ECS (Elastic Container Service) for running containerized applications - RDS for PostgreSQL - ElastiCache for Redis - S3 for storage - CloudFront for CDN - Lambda for background processing - SQS for message queuing - GitHub (source code, CI/CD with GitHub Actions) - Datadog for monitoring - PagerDuty for alerting

Third-Party Integrations: - Stripe for payment processing - Shippo for shipping label generation - SendGrid for transactional email - Twilio for SMS notifications - Auth0 for authentication - Algolia for product search (being migrated to in-house Elasticsearch)

Development Tools: - GitHub with branch protection on main - Docker for local development - Terraform for infrastructure-as-code - GitHub Actions for CI/CD - No dedicated security tools (no SAST, DAST, or SCA in the pipeline)

2.6.3 Threat Analysis for ShopStack

Let us analyze ShopStack's threat landscape:

Most likely threat actors: - Opportunistic attackers scanning for common web application vulnerabilities - Financial criminals targeting payment data and PII - Competitors engaging in scraping or denial-of-service (unlikely but possible) - Disgruntled former employees with knowledge of the codebase

Key attack surface areas: 1. Web application (GraphQL/REST APIs): The primary attack surface. GraphQL is particularly interesting because introspection queries may reveal the entire API schema, and complex nested queries can cause denial-of-service through resource exhaustion. 2. Authentication (Auth0): While Auth0 is a mature platform, misconfigurations in its integration are common. Misconfigured JWT validation, overly permissive CORS policies, and insecure token storage are frequent findings. 3. Cloud infrastructure (AWS): Misconfigured IAM roles, overly permissive S3 bucket policies, exposed metadata services, and insecure security group rules. 4. CI/CD pipeline (GitHub Actions): Secrets in environment variables, insufficient branch protection, and the potential for supply chain attacks through compromised dependencies. 5. Third-party integrations: Each integration represents a trust boundary. A compromised Stripe API key could lead to financial fraud. Exposed SendGrid credentials could enable phishing campaigns using ShopStack's domain. 6. Payment card data: As a payment processor, ShopStack must comply with PCI DSS. Any vulnerability that could expose payment card data is critical. 7. Seller data and PII: Seller accounts contain tax IDs (SSNs or EINs), bank account information for payouts, and personal identifying information.

⚠️ Common Pitfall: Startups often assume that using managed services like Auth0 and Stripe means security is "handled." While these services are generally secure, the integration between your application and these services is where vulnerabilities lurk. A perfectly configured Auth0 instance does not help if your application fails to validate JWT tokens on every API endpoint, or if your Stripe webhook handler does not verify signatures.

2.6.4 ShopStack vs. MedSecure: Different Threat Profiles

Comparing our two running examples illustrates how different organizations face different threats:

Dimension MedSecure ShopStack
Primary threat actors Ransomware groups, espionage Opportunistic attackers, financial criminals
Most valuable data Patient health records (PHI) Payment card data, seller PII
Key regulation HIPAA, state breach notification PCI DSS, state breach notification
Technology profile Legacy + modern hybrid Cloud-native, modern
Biggest challenge Medical device security, legacy systems Rapid development pace, security debt
Attack surface Large, complex, partially unknown Smaller but rapidly expanding
Security maturity Moderate (compliance-driven) Low (startup phase)

🔗 Connection: Throughout this book, we will use both MedSecure and ShopStack to illustrate how the same techniques apply differently depending on the target environment. When we learn about web application testing, ShopStack's React/Node.js/GraphQL stack will be our primary example. When we explore network penetration testing, MedSecure's Active Directory environment will take the lead. This dual-example approach will build versatility in your thinking.


2.7 Threat Intelligence Fundamentals

Threat intelligence is the collection, analysis, and application of information about threats and threat actors. For ethical hackers, threat intelligence informs what you test and how you simulate realistic attack scenarios.

2.7.1 Types of Threat Intelligence

Strategic intelligence provides high-level information about the overall threat landscape, trends, and risks. It is consumed by executives and decision-makers. Example: "Ransomware attacks on healthcare organizations increased 47% in 2024, with average ransom demands exceeding $2 million."

Tactical intelligence describes the TTPs (Tactics, Techniques, and Procedures) used by threat actors. It is consumed by security analysts and penetration testers. Example: "APT29 has been observed using OAuth application registrations in Azure AD to maintain persistent access to compromised Microsoft 365 environments."

Operational intelligence provides specific, actionable information about imminent threats or active campaigns. Example: "A new ransomware variant is actively targeting Cisco VPN appliances using CVE-2023-20198. Organizations using Cisco IOS XE should patch immediately."

Technical intelligence consists of specific indicators of compromise (IOCs) — IP addresses, domain names, file hashes, email addresses, and other observable artifacts. Example: "The C2 server for the SUNBURST backdoor used the domain avsvmcloud[.]com."

2.7.2 Threat Intelligence Sources

Open-source intelligence (OSINT): - MITRE ATT&CK (free, comprehensive) - NIST National Vulnerability Database (CVE details) - CISA advisories and alerts - Vendor security blogs (Microsoft, Google, CrowdStrike, Mandiant) - Security researcher blogs and Twitter/X accounts - VirusTotal (malware analysis) - Shodan and Censys (Internet-wide scanning data) - Have I Been Pwned (credential breach data)

Commercial intelligence: - CrowdStrike Falcon Intelligence - Mandiant Threat Intelligence - Recorded Future - Intel 471 - Flashpoint

Government intelligence: - CISA (U.S. Cybersecurity and Infrastructure Security Agency) - FBI Internet Crime Complaint Center (IC3) - ENISA (European Union Agency for Cybersecurity) - National Cyber Security Centre (UK) - Five Eyes intelligence sharing

Community intelligence: - ISACs (Information Sharing and Analysis Centers) for specific industries - FIRST (Forum of Incident Response and Security Teams) - Security conference presentations (DEF CON, Black Hat, BSides)

2.7.3 Applying Threat Intelligence to Pentesting

Threat intelligence makes penetration tests more realistic and valuable:

  1. Threat modeling: Before beginning a pentest, review threat intelligence for the client's industry. What APT groups target this sector? What ransomware groups have attacked similar organizations? What CVEs are being actively exploited against technology in the client's stack?

  2. Attack simulation: Use documented TTPs to design realistic attack scenarios. If your client faces APT29, simulate their known initial access techniques.

  3. Prioritization: Focus testing on the attack vectors that represent the greatest realistic risk. If the top threat for your client is ransomware via phishing, invest significant testing time in email-based attacks and the post-exploitation paths that ransomware operators follow.

  4. Reporting context: Include threat intelligence context in your reports. "The SQL injection vulnerability in the patient portal is particularly critical because Clop ransomware has exploited similar vulnerabilities in healthcare web applications in the past 12 months (reference: CISA advisory AA23-158A)."

📊 Real-World Application: Many penetration testing firms now include a "Threat Landscape Briefing" as part of their deliverables — a report that contextualizes the pentest findings within the broader threat landscape the client faces. This transforms a pentest from a technical exercise into a strategic risk assessment and significantly increases the value perceived by executive leadership.


2.8 The Attack Surface Concept

The attack surface is the sum of all points where an unauthorized user can try to enter or extract data from a system. Understanding and mapping the attack surface is a fundamental skill for ethical hackers.

2.8.1 Digital Attack Surface

The digital attack surface includes every technology asset that is reachable by an attacker:

  • External surface: Internet-facing systems — web applications, email servers, VPN gateways, DNS servers, cloud services, APIs
  • Internal surface: Systems reachable from within the network — Active Directory, databases, file servers, internal applications, network devices
  • Cloud surface: Cloud resources — storage buckets, serverless functions, container registries, IAM configurations
  • Mobile surface: Mobile applications and their backend APIs

2.8.2 Physical Attack Surface

The physical attack surface includes every physical point of access: - Building entrances and exits - Server rooms and network closets - USB ports on workstations - Wireless networks (Wi-Fi, Bluetooth) - Discarded documents and hardware (dumpster diving)

2.8.3 Human Attack Surface

The human attack surface includes every person who interacts with the organization's systems: - Employees at all levels - Contractors and temporary workers - Partners and vendors with system access - Customers (for customer-facing applications)

2.8.4 Attack Surface Management

A growing discipline called Attack Surface Management (ASM) focuses on continuously discovering, inventorying, and monitoring an organization's attack surface. Tools like Censys, Shodan, and commercial ASM platforms help organizations understand their external attack surface.

For ethical hackers, attack surface enumeration is a critical early step in any engagement. You cannot test what you have not found.

🔴 Red Team Perspective: One of the most valuable findings in a red team engagement is discovering assets that the client did not know they had. Forgotten development servers, test environments exposed to the Internet, shadow IT deployments, and acquired company infrastructure that was never integrated into the security program — these "unknown unknowns" are often the path of least resistance into an organization.


2.9 The Threat Landscape for Our Running Examples

Let us apply what we have learned to analyze the specific threats facing our two running examples in more depth. This exercise mirrors what a professional penetration tester does during the pre-engagement phase: analyzing the client's threat landscape to inform testing strategy.

2.9.1 MedSecure: A Healthcare Threat Deep Dive

Healthcare has been the most expensive industry for data breaches for fourteen consecutive years (IBM Cost of a Data Breach Report). Several factors make healthcare uniquely vulnerable:

Regulatory value of health data: Protected Health Information (PHI) is worth significantly more than financial data on the dark web. A stolen credit card number sells for $1–$5, while a complete medical record can sell for $250–$1,000. Medical records contain everything needed for identity theft, insurance fraud, and prescription fraud, and unlike a credit card number, a medical history cannot be changed or reissued.

Operational complexity: Healthcare organizations must balance security with patient care. A security control that adds 30 seconds to accessing a patient's medication record during a cardiac emergency is unacceptable. This tension between security and clinical workflow creates unique challenges.

Legacy technology: Medical devices often run outdated operating systems (Windows XP Embedded is still common in medical imaging equipment) and cannot be patched without vendor approval, FDA regulatory considerations, and extensive testing. These devices may remain in service for 10–15 years.

For MedSecure specifically, the highest-priority threats are:

  1. Ransomware via phishing (Probability: Very High). Healthcare ransomware attacks increased 47% in 2024. MedSecure's SOC operates only during business hours, meaning a ransomware deployment at 2 AM on a Saturday would go undetected for hours. The impact would be catastrophic — cancelled surgeries, diverted ambulances, paper-based workarounds for patient care.

  2. Medical device exploitation (Probability: Medium, Impact: Critical). The incomplete network segmentation between the medical device network and the corporate network creates a bridge that attackers could use to pivot from compromised corporate systems to connected infusion pumps, patient monitors, and other devices. A compromised infusion pump could directly endanger patient life.

  3. Insider threat from vendor access (Probability: Medium). MedSecure's informal vendor access management means that multiple third-party vendors have VPN credentials that may not be properly monitored, rotated, or revoked. The Target breach of 2013 began with a compromised HVAC contractor credential — a scenario directly analogous to MedSecure's vendor management gap.

  4. Cloud misconfiguration (Probability: Medium). The patient portal runs on AWS with PostgreSQL on RDS and medical imaging in S3. Misconfigured S3 bucket policies could expose DICOM medical imaging files containing patient data. Overly permissive IAM roles could allow an attacker who compromises the patient portal to access additional AWS resources.

2.9.2 ShopStack: A Startup Threat Deep Dive

Startups face a distinct threat profile shaped by rapid growth, limited security resources, and cloud-native architecture:

Speed vs. security tension: ShopStack deploys multiple times per day. Each deployment is a potential introduction of new vulnerabilities. Without SAST, DAST, or SCA tools in the CI/CD pipeline, vulnerabilities may go undetected until they are exploited.

Dependency risk: A modern Node.js application like ShopStack's backend typically has hundreds or thousands of npm dependencies. Each dependency is a potential supply chain attack vector. The 2021 ua-parser-js incident — where a popular npm package was compromised with cryptomining malware — demonstrates this risk.

API-first architecture: ShopStack's GraphQL and REST APIs are the primary attack surface. GraphQL introduces unique risks that many security teams are unfamiliar with, including: - Introspection leakage: If GraphQL introspection is enabled in production, attackers can query the complete API schema - Nested query attacks: Deeply nested queries can cause resource exhaustion (denial-of-service) - Broken Object Level Authorization (BOLA): The most critical API vulnerability, where changing an object ID in a request grants access to another user's data

For ShopStack specifically, the highest-priority threats are:

  1. Web application attacks targeting payment data (Probability: Very High). As a platform processing $50 million in annual transactions, ShopStack is a high-value target for attackers seeking payment card data. SQL injection, insecure direct object references, and broken authentication could all lead to payment data exposure.

  2. Credential stuffing attacks (Probability: Very High). With 200,000 registered buyers, many of whom likely reuse passwords from other breached services, credential stuffing attacks against the login API are virtually guaranteed. Without rate limiting and credential monitoring, attackers could compromise thousands of accounts.

  3. Supply chain compromise via npm (Probability: Medium). ShopStack's Node.js backend likely depends on hundreds of npm packages. A compromised dependency could inject malicious code into ShopStack's application, potentially stealing payment data or seller credentials.

  4. CI/CD pipeline compromise (Probability: Low, Impact: Critical). If an attacker gains access to ShopStack's GitHub repository or GitHub Actions workflows, they could inject malicious code that would be deployed automatically. Secrets stored in environment variables could be exfiltrated.

🔴 Red Team Perspective: When planning a pentest for ShopStack, the most realistic attack scenario is not a sophisticated APT operation — it is an automated scan that discovers a web application vulnerability, followed by exploitation for financial gain. Your testing should focus on the mundane but high-probability scenarios: SQL injection in the search API, IDOR in the seller dashboard, credential stuffing against the login endpoint, and S3 bucket misconfiguration. These are the attacks ShopStack is most likely to face.


2.10 Mapping Attacks to Defenses

Understanding the threat landscape is not just an academic exercise — it directly informs how we approach both attacking and defending systems. Let us map common attack categories to their corresponding testing approaches and defensive controls.

2.10.1 A Practical Mapping

Attack Category Pentest Focus Key Defenses
Phishing Simulated phishing campaigns, email header analysis Email filtering, security awareness, MFA
Web application attacks OWASP testing methodology, API testing WAF, secure coding, input validation, SAST/DAST
Credential attacks Password spraying, Kerberoasting, credential dumps MFA, strong password policies, PAM, credential monitoring
Vulnerability exploitation Vulnerability scanning + manual exploitation Patch management, vulnerability management program
Lateral movement Post-exploitation pivot testing Network segmentation, least privilege, EDR
Data exfiltration Simulated exfiltration testing DLP, network monitoring, egress filtering
Supply chain Third-party risk assessment, dependency analysis Vendor management, SCA, SBOM
Insider threat Access control testing, privilege review Least privilege, monitoring, access reviews

2.10.2 Defense in Depth

No single defense is sufficient. Effective security requires layers of overlapping controls so that the failure of any single control does not result in a breach. When you conduct a penetration test, you are testing the entire defensive stack — not just individual controls. The most valuable pentest findings often involve chains of lesser issues that, combined, enable a critical attack path.

💡 Intuition: Think of defense in depth like a medieval castle. The moat, walls, towers, gates, inner keep, and garrison each provide a layer of defense. An attacker might cross the moat, but they still face the wall. They might breach the wall, but they still face the inner keep. A single defensive failure does not mean defeat. Similarly, in cybersecurity, an attacker might bypass your email filter but still face endpoint detection, network segmentation, and access controls.


2.11 Emerging Threats

The threat landscape is constantly evolving. Several emerging trends deserve attention.

2.11.1 AI-Powered Attacks

AI is enhancing adversary capabilities in several ways: - Automated vulnerability discovery: AI systems that can analyze code and configurations to find exploitable weaknesses - Enhanced social engineering: LLM-generated phishing emails that are personalized, grammatically correct, and contextually appropriate - Deepfakes for fraud: AI-generated voice and video used in business email compromise and social engineering attacks - Polymorphic malware: Malware that uses AI to modify itself to evade detection

2.11.2 OT and IoT Threats

Operational Technology (OT) — industrial control systems, SCADA, and IoT devices — represents a growing attack surface with potentially catastrophic consequences. Attacks on power grids, water treatment facilities, manufacturing plants, and medical devices can cause physical harm and loss of life.

2.11.3 Quantum Computing Threats

While practical quantum computers capable of breaking current cryptography are likely years away, the threat of "harvest now, decrypt later" attacks — where adversaries collect encrypted data today to decrypt when quantum computers become available — is already real. This is particularly concerning for data that must remain confidential for many years (state secrets, medical records, intellectual property).

2.11.4 Cloud-Native and Container Threats

As organizations adopt Kubernetes, serverless, and microservices architectures, new attack patterns emerge. Container escape vulnerabilities, misconfigured Kubernetes RBAC, exposed container registries, and serverless function injection are all areas where the threat landscape is expanding.

2.11.5 Identity-Based Attacks

As organizations move toward cloud and zero-trust architectures, identity has become the new perimeter. Attackers are increasingly targeting identity systems directly:

  • OAuth and SAML abuse: Forging authentication tokens to gain access to cloud resources without valid credentials, as demonstrated in the SolarWinds attack's Golden SAML technique
  • Identity provider compromise: Targeting centralized authentication services (Okta, Azure AD, Auth0) to gain access to all downstream applications
  • Session token theft: Stealing browser cookies or API tokens to hijack authenticated sessions, bypassing MFA entirely
  • MFA fatigue attacks: Bombarding users with push notifications until they approve one, as demonstrated by Lapsus$

For both MedSecure (which uses Microsoft 365 and Cisco AnyConnect) and ShopStack (which uses Auth0), identity system security is a critical testing area. A compromised identity provider grants access to every application that trusts it.

🔗 Connection: We will revisit emerging threats throughout this book. AI-powered attacks are covered in Chapter 35. IoT and OT security are addressed in Chapter 33. Cloud security is covered extensively in Chapters 28-30. Building a solid foundation in threat landscape fundamentals now will prepare you to understand these specialized areas as we reach them.


2.12 Building a Threat Model: A Practical Framework

Before we close this chapter, let us formalize the process of building a threat model. Threat modeling is the structured process of identifying, categorizing, and prioritizing potential threats to a system. It is a skill that connects everything we have discussed in this chapter to actionable security decisions.

2.12.1 The STRIDE Model

Developed by Microsoft, STRIDE categorizes threats into six categories:

  • Spoofing: Pretending to be someone or something else (e.g., IP spoofing, ARP spoofing, email address forgery)
  • Tampering: Modifying data or code (e.g., SQL injection, man-in-the-middle attacks, file modification)
  • Repudiation: Denying having performed an action (e.g., deleting logs, forging timestamps)
  • Information Disclosure: Exposing information to unauthorized parties (e.g., data breaches, directory traversal, error messages revealing system details)
  • Denial of Service: Making a system unavailable (e.g., DDoS attacks, resource exhaustion, crash exploits)
  • Elevation of Privilege: Gaining unauthorized access levels (e.g., privilege escalation, token forgery, exploiting misconfigurations)

2.12.2 A Simplified Threat Modeling Process

For penetration testers, we recommend a four-step threat modeling process:

Step 1: Identify assets. What does the organization value most? For MedSecure, the crown jewels are the Epic EHR database containing patient records. For ShopStack, it is the payment processing system and seller PII database.

Step 2: Identify threat actors. Who might target these assets? Use the classifications from Section 2.2 to identify realistic adversaries based on the organization's industry, size, and public profile.

Step 3: Identify attack vectors. How could each threat actor reach the assets? Map potential attack paths using the MITRE ATT&CK framework, considering the organization's specific technology stack and architecture.

Step 4: Prioritize by risk. Risk equals probability multiplied by impact. A highly probable attack with moderate impact may represent greater risk than an improbable attack with catastrophic impact. Use this prioritization to focus your penetration testing efforts on the most realistic and consequential threats.

2.12.3 Documenting Your Threat Model

A well-documented threat model serves as the foundation for pentest planning. It should include:

  • An asset inventory with criticality ratings
  • A threat actor profile for each relevant adversary
  • A list of attack vectors mapped to ATT&CK techniques
  • A risk matrix showing probability and impact for each scenario
  • Recommended testing priorities based on the risk analysis

Best Practice: Include your threat model in your pentest proposal. This demonstrates to the client that your testing approach is informed by realistic threat intelligence, not just a checklist of automated scans. It differentiates your work from commodity vulnerability scanning and justifies your recommendations with strategic context.


Chapter Summary

In this chapter, we have built a comprehensive understanding of the modern threat landscape:

  1. The threat landscape is more complex and dangerous than ever, driven by the professionalization of cybercrime, geopolitical competition, AI augmentation, and the expanding attack surface.

  2. Threat actors range from script kiddies to nation-state APTs, motivated by financial gain, espionage, disruption, ideology, curiosity, and revenge. Understanding who might attack — and why — is essential for realistic security testing.

  3. The Cyber Kill Chain describes the seven stages of an attack (Reconnaissance through Actions on Objectives) and provides defensive opportunities at each stage.

  4. The MITRE ATT&CK framework provides a detailed, standardized taxonomy of adversary behaviors organized by tactics, techniques, and sub-techniques. It is an indispensable resource for planning, executing, and reporting penetration tests.

  5. Common attack vectors include phishing, web application exploitation, vulnerability exploitation, credential attacks, supply chain attacks, ransomware, insider threats, and cloud-specific attacks.

  6. ShopStack — our second running example — presents a cloud-native, startup threat profile that contrasts with MedSecure's hybrid healthcare environment.

  7. Threat intelligence — strategic, tactical, operational, and technical — transforms raw data about threats into actionable knowledge that makes penetration tests more realistic and valuable.

  8. Attack surface management encompasses digital, physical, and human attack surfaces and is a critical first step in any security assessment.


What's Next

In Chapter 3, we will roll up our sleeves and get hands-on. You will build your own hacking lab — a safe, isolated environment where you can practice every technique in this book without risking legal consequences or causing harm to real systems. We will install Kali Linux, set up vulnerable target machines, configure network isolation, and explore online practice platforms. By the end of Chapter 3, you will have a functioning lab environment and your first experience with reconnaissance and scanning tools.

It is time to stop reading about hacking and start doing it — safely, legally, and methodically.