Attack Vectors and Attack Surface

Key Takeaways

  • An attack vector is the path used to reach a target; attack surface is the total set of reachable entry points.
  • Common vectors include email, web apps, exposed services, credentials, wireless, removable media, cloud misconfiguration, and third parties.
  • Reducing attack surface means removing, hardening, segmenting, monitoring, or restricting access to entry points.
  • Credential attacks often exploit reuse, weak passwords, exposed secrets, or poor MFA controls.
  • Internet-facing systems and identity providers deserve high priority because compromise can spread quickly.
Last updated: April 2026

Attack Vectors and Attack Surface

An attack vector is the route. Attack surface is the collection of possible routes. A single exposed admin portal is a vector; all exposed portals, APIs, services, identities, vendors, and devices make up the attack surface.

VectorWhat attackers exploitCommon reduction
Email and messagingLinks, attachments, impersonationFiltering, training, DMARC, sandboxing
Web applicationInjection, broken access control, vulnerable componentsSecure coding, testing, WAF, patching
Exposed serviceOpen RDP, SSH, VPN, database portDisable, restrict, patch, require MFA
CredentialsReuse, weak passwords, leaked secretsMFA, password manager, secret scanning
WirelessWeak encryption, evil twin, rogue APWPA3 where supported, strong auth, monitoring
Removable mediaMalware, unauthorized data movementDisable or control USB, DLP, scanning
Cloud configurationPublic buckets, permissive IAM, exposed keysCSPM, least privilege, guardrails
Third partyVendor access, integration, support toolsDue diligence, contracts, segmentation

Attack Surface Questions

Look for the phrase "reduce the attack surface." The best answer usually removes or narrows reachability, not merely detects later.

ScenarioBetter answerWeaker answer
RDP exposed to internetPut behind VPN/ZTNA and require MFAOnly increase log retention
Unused service running on serverDisable the serviceRename the service
Public cloud storage bucketBlock public access and fix policyAdd a banner
Developers commit API keysSecret scanning and key rotationAdd a policy reminder without rotating keys
Flat network allows lateral movementSegment networks and restrict east-west trafficIncrease asset inventory detail only

Credential Attack Clues

ClueAttack pattern
One password tried against many usernamesPassword spraying
Many passwords tried against one accountBrute force
Known username/password pairs tested across sitesCredential stuffing
Captured authentication token reusedReplay or session hijacking
Login from impossible travel locationsStolen credential or session

Scenario Walkthrough

A company finds that an old management interface is reachable from the internet. It has not been patched in months and supports only passwords. The best first move is to reduce exposure: remove internet access, restrict to an administrative network or ZTNA/VPN path, patch the service, require MFA if supported, and monitor access. A SIEM alert is useful, but it does not reduce the reachable attack path by itself.

Quick Drill

Question asks for...Think...
Path used to attackAttack vector
All possible pathsAttack surface
Fewer reachable servicesDisable, firewall, segment, restrict
Fewer credential risksMFA, password policy, breached password checks, secret management
Less lateral movementSegmentation and least privilege
Test Your Knowledge

A scan finds an unused database listener exposed to the internet. Which action most directly reduces attack surface?

A
B
C
D
Test Your Knowledge

Attackers test one common password against hundreds of usernames to avoid account lockout. What is this called?

A
B
C
D
Test Your KnowledgeMulti-Select

Which actions reduce attack surface? Choose two.

Select all that apply

Disable unused services
Restrict admin access to a managed path
Ignore exposed systems until the next audit
Give all users administrator access