Explain various types of vulnerabilities
A vulnerability is a weakness that can be exploited by a threat actor. This objective covers the categories of vulnerabilities you’ll encounter across applications, systems, hardware, and humans.
Application Vulnerabilities
Memory Injection
Injecting malicious code into a running process’s memory space.
- DLL injection: Forcing a process to load an attacker-controlled library
- Process hollowing: Starting a legitimate process, replacing its code in memory with malware
- Used for privilege escalation and defense evasion
Buffer Overflow
Writing data beyond the boundaries of allocated memory, corrupting adjacent data.
- Stack overflow: Overwriting the return address on the stack to redirect execution
- Heap overflow: Corrupting dynamically allocated memory structures
- Integer overflow: Arithmetic that wraps around, producing an unexpectedly small buffer
- Prevention: Input validation, bounds checking, ASLR, DEP/NX, stack canaries
Race Conditions
When the outcome depends on the timing of events, and an attacker can manipulate that timing.
- TOCTOU (Time of Check, Time of Use): Exploit the gap between a security check and the action it authorizes
- Example: File permission check passes, attacker swaps the file before it’s read
- Prevention: Atomic operations, proper locking mechanisms
Injection Attacks
Untrusted input interpreted as code or commands.
- SQL injection: Manipulating database queries through user input
- Command injection: Executing OS commands through application inputs
- LDAP injection: Manipulating directory service queries
- XML injection / XXE: Exploiting XML parsers to read files, perform SSRF
- Prevention: Parameterized queries, input validation, output encoding. Never trust user input.
XSS (Cross-Site Scripting)
Injecting client-side scripts into web pages viewed by other users.
- Reflected: Malicious script in URL parameter, reflected back in the response
- Stored: Script saved to the server (database, comment field), executed for all visitors
- DOM-based: Script manipulates the page’s DOM without server involvement
- Prevention: Output encoding, Content Security Policy (CSP), input sanitization
Privilege Escalation
Gaining higher permissions than authorized.
- Vertical: Normal user → admin
- Horizontal: User A accesses User B’s resources
- Exploited through misconfigurations, vulnerable services, kernel exploits
Operating System Vulnerabilities
Unpatched Systems
Known vulnerabilities with available fixes that haven’t been applied.
- Most breaches exploit known CVEs, not zero-days
- Patch management process failures = vulnerability accumulation
Misconfigurations
- Default settings left unchanged (default passwords, unnecessary services enabled)
- Overly permissive file/directory permissions
- Debug mode or verbose error messages exposed in production
- Open network shares with sensitive data
End-of-Life (EOL) Software
Operating systems and applications no longer receiving security updates.
- Windows Server 2012, Windows 7, older Linux kernels
- Any vulnerability discovered after EOL will never be patched
- Compensating controls required: Network isolation, enhanced monitoring, application whitelisting
Hardware Vulnerabilities
Firmware
Software embedded in hardware that operates below the OS layer.
- Firmware vulnerabilities persist across OS reinstalls
- BIOS/UEFI attacks can survive disk wipes
- Supply chain firmware implants are difficult to detect
Side-Channel Attacks
Extracting information from the physical implementation of a system.
- Timing attacks: Measuring operation timing to infer secret values
- Power analysis: Monitoring power consumption patterns during cryptographic operations
- Spectre/Meltdown: CPU speculative execution leaking data across security boundaries
- Electromagnetic emanations: Capturing signals from hardware components
Hardware Root of Trust
- TPM (Trusted Platform Module) provides a hardware-based security anchor
- Secure boot chain: each component verifies the next before loading
- If hardware root of trust is compromised, nothing above it can be trusted
Virtualization Vulnerabilities
VM Escape
Breaking out of a virtual machine to access the hypervisor or other VMs on the same host.
- Critical because it breaks the isolation that virtualization promises
- Rare but devastating — access to the hypervisor means access to everything
Resource Reuse
- Memory not properly cleared between VM allocations
- Potential for data leakage between tenants in cloud environments
VM Sprawl
- Unmanaged proliferation of virtual machines
- Forgotten VMs running outdated, unpatched software = shadow attack surface
Cloud-Specific Vulnerabilities
Misconfigured Cloud Storage
- S3 buckets, Azure Blobs, GCS buckets exposed to public access
- One of the most common sources of data breaches in cloud environments
- Exam tip: Cloud misconfiguration questions are almost guaranteed
Insecure APIs
- Cloud services managed via API — misconfigurations in API permissions have outsized impact
- Overly permissive IAM roles, exposed API keys, lack of rate limiting
Shared Responsibility Model
- Cloud provider secures the infrastructure; customer secures their configuration, data, and access
- Misunderstanding this boundary is itself a vulnerability
Cryptographic Vulnerabilities
Weak/Deprecated Algorithms
- MD5, SHA-1, DES, RC4 — known broken, should not be used
- Exam focus: Know which algorithms are deprecated and why
Improper Implementation
- Using ECB mode (patterns preserved in ciphertext)
- Hardcoded encryption keys in source code
- Insufficient key length (RSA < 2048, AES < 128)
Certificate Issues
- Expired certificates breaking trust chain
- Self-signed certificates in production
- Wildcard certificate compromise = all subdomains compromised
Zero-Day Vulnerabilities
- Vulnerability unknown to the vendor with no available patch
- Highest value to attackers (nation-states stockpile zero-days)
- Defense: assume-breach posture, behavior-based detection, network segmentation
- Once disclosed and patched, it becomes a known vulnerability (but many orgs still don’t patch promptly)
Human Vulnerabilities
Social Engineering Susceptibility
- Lack of security awareness training
- Authority bias (blindly following requests from “executives”)
- Urgency manipulation (“your account will be locked in 30 minutes”)
Misconfiguration by Operators
- Human error in system configuration
- Copy/paste mistakes in firewall rules, IAM policies
- “Temporary” exceptions that become permanent
Offensive Context
Vulnerability assessment from the offensive side is about prioritization, not just enumeration. An attacker doesn’t care about your CVSS 10.0 vulnerability on an air-gapped system — they care about the CVSS 7.0 vulnerability on your internet-facing VPN concentrator. Thinking about vulnerability exploitation chains (combine a medium-severity SQLi with a medium-severity privilege escalation for a critical-impact breach) is what separates checkbox scanning from real security assessment.