CompTIA Security+ Threats & Attacks Study Guide
Overview
This study guide covers the core threat and attack concepts tested on the CompTIA Security+ exam, including malware classifications, social engineering techniques, network and application attacks, and threat intelligence frameworks. Understanding both how each attack works and why it is effective is essential for exam success and real-world security practice. Mastery of these topics will prepare you for scenario-based questions that require you to identify, differentiate, and respond to various attack types.
---
Malware Types
Summary
Malware encompasses any software designed to disrupt, damage, or gain unauthorized access to systems. The Security+ exam tests your ability to identify malware by its behavior, not just its name. Focus on propagation methods, persistence mechanisms, and detection challenges.
Key Malware Definitions
| Malware Type | Core Behavior | Key Distinguishing Feature |
|---|---|---|
| Trojan Horse | Disguises itself as legitimate software | Does not self-replicate; relies on user execution |
| Virus | Attaches to a host file | Requires user action and a host file to spread |
| Worm | Self-replicates across networks | Spreads without a host file or user interaction |
| Rootkit | Hides malware and gains privileged access | Conceals presence from the OS and security tools |
| Ransomware | Encrypts files and demands payment | Objective is financial extortion via decryption key |
| Logic Bomb | Dormant code triggered by a condition | Triggered by date, time, or specific user action |
| Keylogger | Records keystrokes | Primarily captures passwords and sensitive input |
| Spyware | Secretly monitors and exfiltrates user data | Sends data to third party without user knowledge |
| Adware | Displays unwanted advertisements | May not capture sensitive data (less malicious than spyware) |
| Botnet/Zombie | Network of compromised machines | Controlled by botmaster; used for DDoS, spam, credential stuffing |
| Fileless Malware | Operates entirely in RAM | Leverages PowerShell/WMI; no files written to disk |
Key Terms
Watch Out For
> ⚠️ Trojan vs. Virus vs. Worm — This is a classic exam trap. Remember: Trojans don't replicate, viruses need a host file, and worms need neither. Questions may describe behavior and ask you to name the type.
> ⚠️ Fileless Malware Detection — Exam questions may ask why fileless malware evades detection. The answer is always that it lives in memory (RAM), not on disk, so file-scanning antivirus tools miss it.
> ⚠️ Logic Bomb vs. Ransomware — A logic bomb waits for a trigger before executing. Ransomware immediately encrypts data. Do not confuse a time-delayed ransomware delivery with a logic bomb.
> ⚠️ Spyware vs. Adware — Spyware steals sensitive data; adware displays ads. Adware is annoying but not necessarily data-stealing.
---
Social Engineering
Summary
Social engineering exploits human psychology rather than technical vulnerabilities. Attackers manipulate victims by leveraging trust, authority, urgency, and fear. The Security+ exam heavily tests your ability to distinguish between similar attack types and understand the psychological principles behind them.
Social Engineering Attack Types
#### Phishing Variants
#### Manipulation Techniques
Principles of Social Engineering Influence
| Principle | How It Is Exploited |
|---|---|
| Authority | Impersonating managers, law enforcement, or IT admins |
| Urgency/Scarcity | "Your account will be locked in 24 hours" |
| Social Proof | "Everyone else in your department has already done this" |
| Intimidation | Threatening legal or professional consequences |
| Trust/Familiarity | Referencing colleagues' names or recent company events |
Key Terms
Watch Out For
> ⚠️ Whaling vs. Spear Phishing — All whaling is spear phishing, but not all spear phishing is whaling. Whaling = executive-level targets specifically.
> ⚠️ Tailgating vs. Pretexting — Tailgating is a physical attack. Pretexting is a psychological manipulation technique that can be used in person, over the phone, or online.
> ⚠️ Watering Hole Attribution — This attack is often associated with nation-state/APT actors targeting specific industries. If an exam scenario describes a whole industry sector being compromised through websites, think watering hole.
---
Network Attacks
Summary
Network attacks exploit weaknesses in protocols, configurations, and traffic flows. The Security+ exam tests your ability to identify attack types from scenario descriptions and understand which countermeasures are most appropriate.
Attack Reference Table
| Attack | Mechanism | Key Impact |
|---|---|---|
| DoS | Single source overwhelms target | Service unavailability |
| DDoS | Multiple distributed sources (botnet) | Harder to block; massive scale |
| MitM | Intercepts communications between two parties | Eavesdropping, data alteration |
| ARP Poisoning | Fake ARP replies linking attacker's MAC to legitimate IP | Enables MitM on LAN |
| DNS Cache Poisoning | Fraudulent DNS records injected into resolver cache | Redirects users to malicious sites |
| Replay Attack | Captured credentials/tokens retransmitted later | Unauthorized access |
| SSL Stripping | Downgrades HTTPS to HTTP via MitM | Exposes plaintext traffic |
| Smurf Attack | ICMP flood using broadcast address with spoofed victim IP | DDoS amplification |
Attack Deep Dives
#### ARP Poisoning → MitM Chain
1. Attacker sends forged ARP replies on the LAN
2. Victim's ARP cache maps attacker's MAC to the gateway's IP
3. All victim traffic is routed through the attacker's machine
4. Attacker forwards traffic (invisible to victim) while capturing data
#### Replay Attack Prevention
The most effective controls are:
#### SSL Stripping Countermeasure
Key Terms
Watch Out For
> ⚠️ DoS vs. DDoS — The exam distinguishes these by source count. DoS = one source. DDoS = many distributed sources. If the scenario mentions a botnet, it's DDoS.
> ⚠️ ARP Poisoning Scope — ARP operates only on the local network (LAN). ARP poisoning cannot be used directly over the internet.
> ⚠️ DNS Poisoning vs. DNS Hijacking — Poisoning targets the cache of a DNS resolver. Hijacking typically modifies DNS settings on the victim's device or router. Know the difference.
> ⚠️ Smurf Attack is Amplification — The amplification factor is the number of hosts on the broadcast network. This is a DDoS technique using ICMP.
---
Application & Injection Attacks
Summary
Application attacks target vulnerabilities in software design and input validation. These are among the most common real-world attack vectors and are heavily tested on Security+. Understanding what the attack targets and how input validation prevents it is critical.
Application Attack Types
#### SQL Injection (SQLi)
#### Cross-Site Scripting (XSS)
| Type | How It Works | Scope |
|---|---|---|
| Stored (Persistent) XSS | Script saved to server database; executes for all users loading the page | Affects all users of the page |
| Reflected (Non-Persistent) XSS | Script embedded in a URL; executes only when victim clicks the link | Affects only the specific victim who clicks |
#### Buffer Overflow
#### Cross-Site Request Forgery (CSRF)
#### Directory Traversal
XSS vs. CSRF — Critical Comparison
| | XSS | CSRF |
|---|---|---|
| Exploits trust of | User trusts the site | Site trusts the user |
| Attack vector | Injected script executes in victim's browser | Forged request sent from victim's browser |
| Prevention | Output encoding, CSP | Anti-CSRF tokens, SameSite cookies |
Key Terms
Watch Out For
> ⚠️ XSS vs. CSRF Confusion — This is one of the most commonly confused pairs. Remember: XSS injects malicious scripts into a page; CSRF forges requests using the victim's authenticated session.
> ⚠️ Stored vs. Reflected XSS Impact — Stored XSS is more dangerous because it affects every user who visits the page, not just a targeted individual.
> ⚠️ Buffer Overflow ≠ Memory Leak — A buffer overflow actively writes beyond buffer bounds to execute malicious code. A memory leak is when memory is allocated but never released (a performance issue, not directly an exploit vector).
---
Threat Intelligence & Attack Concepts
Summary
This section covers the strategic frameworks and concepts used to understand, categorize, and hunt threats. The Security+ exam expects familiarity with industry-standard models (Kill Chain, MITRE ATT&CK) and concepts like APTs, zero-days, and IoCs that appear in scenario-based questions.
Advanced Persistent Threats (APTs)
The Cyber Kill Chain (Lockheed Martin)
| Stage | Description |
|---|---|
| 1. Reconnaissance | Gathering information about the target |
| 2. Weaponization | Creating a malicious payload (exploit + malware) |
| 3. Delivery | Transmitting the weapon (email, USB, website) |
| 4. Exploitation | Triggering the exploit on the victim's system |
| 5. Installation | Installing malware/backdoor for persistence |
| 6. Command & Control (C2) | Establishing communication channel to control the system |
| 7. Actions on Objectives | Executing the attacker's goal (exfiltration, destruction) |
> 💡 Key Insight: The Kill Chain model helps defenders identify which stage an attack is in and where to interrupt it. Stopping an attack at stage 1 (Reconnaissance) is more cost-effective than responding at stage 7.
MITRE ATT&CK Framework
- Threat detection and rule creation
- Red/blue team exercise planning
- Security gap analysis
- Mapping observed behavior to known threat actor groups
Zero-Day Vulnerabilities
Indicators of Compromise (IoCs)
Common IoC Examples:
Supply Chain Attacks
Threat Hunting vs. Incident Response
| | Threat Hunting | Incident Response |
|---|---|---|
| Approach | Proactive | Reactive |
| Trigger | Hypothesis-driven; analyst-initiated | Alert or detected event |
| Goal | Find threats already in the network | Contain and remediate known incidents |
| Assumption | Attacker may already be present | Attack is happening or has happened |