SY0-701 Study Notes
Search
Search
Dark mode
Light mode
Explorer
Tag: domain/2
170 items with this tag.
Mar 20, 2026
Domain 2: Threats, Vulnerabilities & Mitigations
domain/2
Mar 21, 2026
Case: The SSRF to Cloud Metadata Exploit — When API Vulnerabilities Chain
domain/2
type/case
Mar 21, 2026
Case: POODLE at the Payment Gateway — Downgrade Attacks in Production
domain/2
type/case
Mar 21, 2026
Case: New Year's Eve DDoS — When Upstream Capacity Fails
domain/2
type/case
Mar 21, 2026
Case: The Poisoned Resolver — DNS Cache Poisoning at BlueTech Logistics
domain/2
type/case
Mar 21, 2026
Case: IOC Correlation Across Subsidiaries — Finding the Needle in 1,200 Alerts
domain/2
type/case
Mar 21, 2026
Case: Blind SQL Injection — The State University Registration Portal Breach
domain/2
type/case
Mar 21, 2026
Case: Fileless Malware at Sterling & Associates — The Law Firm That Lost Its Secrets
domain/2
type/case
Mar 21, 2026
Case: The Unpatched IoT Fleet — Compensating Controls When Patching Is Impossible
domain/2
type/case
Mar 21, 2026
Case: ARP Spoofing in the Data Center — The Management Network Compromise
domain/2
type/case
Mar 21, 2026
Case: The Coffee Shop Demonstration — SSL Stripping Over Public Wi-Fi
domain/2
type/case
Mar 21, 2026
Case: Credential Stuffing at TravelNow — 14,000 Compromised Accounts in 90 Minutes
domain/2
type/case
Mar 21, 2026
Case: The 3:17 AM Encryption — Double-Extortion Ransomware at Precision Manufacturing
domain/2
type/case
Mar 21, 2026
Case: The County Government's 8-Year Technical Debt — 412 End-of-Life Systems
domain/2
type/case
Mar 21, 2026
Case: The Hospital Rogue Access Points — Evil Twin Networks Compromise Patient Telemetry
domain/2
type/case
Mar 21, 2026
Case: The Ticket System Stored XSS — Support Agents Compromised via Malicious Tickets
domain/2
type/case
Mar 20, 2026
Application Attacks
domain/2
concept/network
weight/high
Mar 20, 2026
Access control lists (ACLs)
domain/2
type/sub-topic
Mar 20, 2026
Account indicators
domain/2
type/sub-topic
Mar 20, 2026
Amplification attack
domain/2
type/sub-topic
Mar 20, 2026
Amplification/Reflection
domain/2
type/sub-topic
Mar 20, 2026
API attacks
domain/2
type/sub-topic
Mar 20, 2026
Application allowlisting
domain/2
type/sub-topic
Mar 20, 2026
Application-layer attacks
domain/2
type/sub-topic
Mar 20, 2026
ARP spoofing/poisoning
domain/2
type/sub-topic
Mar 20, 2026
Behavioral indicators
domain/2
type/sub-topic
Mar 20, 2026
Birthday attack
domain/2
type/sub-topic
Mar 20, 2026
Blind SQL injection
domain/2
type/sub-topic
Mar 20, 2026
Bluetooth attacks
domain/2
type/sub-topic
Mar 20, 2026
Botnet
domain/2
type/sub-topic
Mar 20, 2026
Brute force
domain/2
type/sub-topic
Mar 20, 2026
Buffer overflow
domain/2
type/sub-topic
Mar 20, 2026
Chosen plaintext/ciphertext attack
domain/2
type/sub-topic
Mar 20, 2026
Collision attack
domain/2
type/sub-topic
Mar 20, 2026
Command injection (OS injection)
domain/2
type/sub-topic
Mar 20, 2026
Common delivery methods
domain/2
type/sub-topic
Mar 20, 2026
Compensating controls
domain/2
type/sub-topic
Mar 20, 2026
Credential stuffing
domain/2
type/sub-topic
Mar 20, 2026
Cryptocurrency payment
domain/2
type/sub-topic
Mar 20, 2026
Deauthentication attack
domain/2
type/sub-topic
Mar 20, 2026
Decommissioning
domain/2
type/sub-topic
Mar 20, 2026
Default credentials
domain/2
type/sub-topic
Mar 20, 2026
Defenses
domain/2
type/sub-topic
Mar 20, 2026
Deprecated algorithms
domain/2
type/sub-topic
Mar 20, 2026
Dictionary attack
domain/2
type/sub-topic
Mar 20, 2026
Directory traversal
domain/2
type/sub-topic
Mar 20, 2026
DLL injection
domain/2
type/sub-topic
Mar 20, 2026
DNS amplification
domain/2
type/sub-topic
Mar 20, 2026
DNS hijacking
domain/2
type/sub-topic
Mar 20, 2026
DNS over HTTPS (DoH) / DNS over TLS (DoT)
domain/2
type/sub-topic
Mar 20, 2026
DNS poisoning / DNS cache poisoning
domain/2
type/sub-topic
Mar 20, 2026
DNS spoofing
domain/2
type/sub-topic
Mar 20, 2026
DNS tunneling
domain/2
type/sub-topic
Mar 20, 2026
DNSSEC (DNS Security Extensions)
domain/2
type/sub-topic
Mar 20, 2026
DOM-based XSS
domain/2
type/sub-topic
Mar 20, 2026
Domain hijacking
domain/2
type/sub-topic
Mar 20, 2026
Double extortion
domain/2
type/sub-topic
Mar 20, 2026
Downgrade attack
domain/2
type/sub-topic
Mar 20, 2026
Email indicators
domain/2
type/sub-topic
Mar 20, 2026
Encryption-based ransomware
domain/2
type/sub-topic
Mar 20, 2026
Encryption
domain/2
type/sub-topic
Mar 20, 2026
Evil twin
domain/2
type/sub-topic
Mar 20, 2026
CSRF Example
domain/2
type/sub-topic
Mar 20, 2026
False positives
domain/2
type/sub-topic
Mar 20, 2026
File-based indicators
domain/2
type/sub-topic
Mar 20, 2026
Fileless malware
domain/2
type/sub-topic
Mar 20, 2026
Hardware vulnerabilities
domain/2
type/sub-topic
Mar 20, 2026
Host-based indicators
domain/2
type/sub-topic
Mar 20, 2026
HTML injection
domain/2
type/sub-topic
Mar 20, 2026
HTTPS spoofing
domain/2
type/sub-topic
Mar 20, 2026
Human factors
domain/2
type/sub-topic
Mar 20, 2026
Hybrid attack
domain/2
type/sub-topic
Mar 20, 2026
Impact
domain/2
type/sub-topic
Mar 20, 2026
Indicators of Attack (IoA)
domain/2
type/sub-topic
Mar 20, 2026
Input validation
domain/2
type/sub-topic
Mar 20, 2026
Insecure protocols
domain/2
type/sub-topic
Mar 20, 2026
Integer overflow
domain/2
type/sub-topic
Mar 20, 2026
IP spoofing
domain/2
type/sub-topic
Mar 20, 2026
Jamming
domain/2
type/sub-topic
Mar 20, 2026
Kerberoasting
domain/2
type/sub-topic
Mar 20, 2026
Key stretching
domain/2
type/sub-topic
Mar 20, 2026
Keylogger
domain/2
type/sub-topic
Mar 20, 2026
Keylogging
domain/2
type/sub-topic
Mar 20, 2026
Known plaintext attack
domain/2
type/sub-topic
Mar 20, 2026
KRACK (Key Reinstallation Attack)
domain/2
type/sub-topic
Mar 20, 2026
Lateral movement
domain/2
type/sub-topic
Mar 20, 2026
LDAP injection
domain/2
type/sub-topic
Mar 20, 2026
Locker ransomware
domain/2
type/sub-topic
Mar 20, 2026
Logic bomb
domain/2
type/sub-topic
Mar 20, 2026
MAC flooding
domain/2
type/sub-topic
Mar 20, 2026
Man-in-the-Browser (MitB)
domain/2
type/sub-topic
Mar 20, 2026
CSRF Mechanism
domain/2
type/sub-topic
Mar 20, 2026
Memory vulnerabilities
domain/2
type/sub-topic
Mar 20, 2026
Metamorphic malware
domain/2
type/sub-topic
Mar 20, 2026
Misconfigurations
domain/2
type/sub-topic
Mar 20, 2026
Network-based indicators
domain/2
type/sub-topic
Mar 20, 2026
Network segmentation
domain/2
type/sub-topic
Mar 20, 2026
NFC attacks
domain/2
type/sub-topic
Mar 20, 2026
Notable examples
domain/2
type/sub-topic
Mar 20, 2026
Parameterized queries / Prepared statements
domain/2
type/sub-topic
Mar 20, 2026
Pass-the-hash
domain/2
type/sub-topic
Mar 20, 2026
Password spraying
domain/2
type/sub-topic
Mar 20, 2026
Patching
domain/2
type/sub-topic
Mar 20, 2026
Polymorphic malware
domain/2
type/sub-topic
Mar 20, 2026
Port scanning
domain/2
type/sub-topic
Mar 20, 2026
Potentially Unwanted Programs (PUPs)
domain/2
type/sub-topic
Mar 20, 2026
Privilege escalation
domain/2
type/sub-topic
Mar 20, 2026
Protocol attacks
domain/2
type/sub-topic
Mar 20, 2026
Quantum computing threat
domain/2
type/sub-topic
Mar 20, 2026
Race condition / TOCTOU
domain/2
type/sub-topic
Mar 20, 2026
Race conditions
domain/2
type/sub-topic
Mar 20, 2026
Rainbow table attack
domain/2
type/sub-topic
Mar 20, 2026
Ransomware-as-a-Service (RaaS)
domain/2
type/sub-topic
Mar 20, 2026
RAT (Remote Access Trojan)
domain/2
type/sub-topic
Mar 20, 2026
Reflected XSS
domain/2
type/sub-topic
Mar 20, 2026
Relay attacks
domain/2
type/sub-topic
Mar 20, 2026
Replay attack
domain/2
type/sub-topic
Mar 20, 2026
Resource exhaustion
domain/2
type/sub-topic
Mar 20, 2026
RFID cloning
domain/2
type/sub-topic
Mar 20, 2026
Rogue access point
domain/2
type/sub-topic
Mar 20, 2026
Rogue DHCP server
domain/2
type/sub-topic
Mar 20, 2026
Rootkit
domain/2
type/sub-topic
Mar 20, 2026
Salting
domain/2
type/sub-topic
Mar 20, 2026
Security awareness training
domain/2
type/sub-topic
Mar 20, 2026
Security baselines and hardening
domain/2
type/sub-topic
Mar 20, 2026
Server-Side Request Forgery (SSRF)
domain/2
type/sub-topic
Mar 20, 2026
Session hijacking
domain/2
type/sub-topic
Mar 20, 2026
Session replay
domain/2
type/sub-topic
Mar 20, 2026
Shoulder surfing
domain/2
type/sub-topic
Mar 20, 2026
Side-channel attacks
domain/2
type/sub-topic
Mar 20, 2026
Slowloris
domain/2
type/sub-topic
Mar 20, 2026
Smurf attack
domain/2
type/sub-topic
Mar 20, 2026
Spyware
domain/2
type/sub-topic
Mar 20, 2026
SQL injection (SQLi)
domain/2
type/sub-topic
Mar 20, 2026
SSL/TLS interception (SSL proxy)
domain/2
type/sub-topic
Mar 20, 2026
SSL/TLS stripping
domain/2
type/sub-topic
Mar 20, 2026
STIX/TAXII
domain/2
type/sub-topic
Mar 20, 2026
Stored (Persistent) XSS
domain/2
type/sub-topic
Mar 20, 2026
Stored procedures
domain/2
type/sub-topic
Mar 20, 2026
SYN flood
domain/2
type/sub-topic
Mar 20, 2026
Third-party/supply chain risks
domain/2
type/sub-topic
Mar 20, 2026
Threat feeds
domain/2
type/sub-topic
Mar 20, 2026
Triple extortion
domain/2
type/sub-topic
Mar 20, 2026
Trojan
domain/2
type/sub-topic
Mar 20, 2026
Typosquatting / URL hijacking
domain/2
type/sub-topic
Mar 20, 2026
Unpatched software
domain/2
type/sub-topic
Mar 20, 2026
Virus
domain/2
type/sub-topic
Mar 20, 2026
VLAN hopping
domain/2
type/sub-topic
Mar 20, 2026
Volumetric attacks
domain/2
type/sub-topic
Mar 20, 2026
War driving
domain/2
type/sub-topic
Mar 20, 2026
Weak encryption
domain/2
type/sub-topic
Mar 20, 2026
Worm
domain/2
type/sub-topic
Mar 20, 2026
WPA/WPA2 handshake capture
domain/2
type/sub-topic
Mar 20, 2026
WPS attacks
domain/2
type/sub-topic
Mar 20, 2026
XML injection / XXE
domain/2
type/sub-topic
Mar 20, 2026
Zero-day vulnerabilities
domain/2
type/sub-topic
Mar 20, 2026
Cryptographic Attacks
domain/2
concept/cryptography
weight/medium
Mar 20, 2026
Denial of Service
domain/2
concept/network
weight/high
Mar 20, 2026
DNS Attacks
domain/2
concept/network
weight/medium
Mar 20, 2026
Indicators of Compromise
domain/2
concept/incident
weight/high
Mar 20, 2026
Injection Attacks
domain/2
concept/network
weight/high
Mar 20, 2026
Malware Types
domain/2
concept/endpoint
weight/high
Mar 20, 2026
Mitigation Techniques
domain/2
concept/risk
weight/high
Mar 20, 2026
Network Attacks
domain/2
concept/network
weight/high
Mar 20, 2026
On-Path Attacks
domain/2
concept/network
weight/medium
Mar 20, 2026
Password Attacks
domain/2
concept/identity
weight/high
Mar 20, 2026
Ransomware
domain/2
concept/endpoint
weight/high
Mar 20, 2026
Vulnerability Types
domain/2
concept/risk
weight/high
Mar 20, 2026
Wireless Attacks
domain/2
concept/network
weight/medium
Mar 20, 2026
Cross-Site Scripting and Cross-Site Request Forgery
domain/2
concept/network
weight/high