Attack tree (IPv4 and IPv6)¶
1. Compromise Internet Protocol (IP) [OR]
1.1 Initial Access [OR]
1.1.1 Phishing & Social Engineering [OR]
1.1.1.1 Spear Phishing (PDF/Excel malware)
1.1.1.2 Business Email Compromise (BEC) with deepfake audio/video
1.1.1.3 LinkedIn/Twitter impersonation for credential theft
1.1.2 Exploiting Cloud Misconfigurations [OR]
1.1.2.1 Exposed S3 buckets (AWS) or Azure Blob Storage
1.1.2.2 Misconfigured GitHub/GitLab repos (API keys, credentials)
1.1.2.3 Publicly exposed Kubernetes API servers
1.1.3 Supply Chain Attacks [OR]
1.1.3.1 Dependency confusion (malicious npm/PyPi packages)
1.1.3.2 Compromised SaaS vendors (SolarWinds-style attacks)
1.1.3.3 Compromised software update mechanisms
1.2 Lateral Movement & Privilege Escalation [OR]
1.2.1 Exploiting Zero-Day Vulnerabilities [OR]
1.2.1.1 RCE in enterprise VPNs (Pulse Secure, Citrix CVE-2023-3519)
1.2.1.2 Windows/Linux privilege escalation (Dirty Pipe, Log4Shell)
1.2.1.3 Exploiting IPv6 NDP or SLAAC flaws
1.2.2 Cloud Identity Attacks [OR]
1.2.2.1 OAuth token hijacking (Microsoft/Azure AD)
1.2.2.2 Shadow API abuse (undocumented cloud APIs)
1.2.2.3 Privileged role assignment abuse
1.3 Data Exfiltration [OR]
1.3.1 Encrypted Exfiltration [OR]
1.3.1.1 DNS tunneling (DoH/DoT for stealth)
1.3.1.2 Legitimate cloud services (Dropbox, Google Drive, Slack)
1.3.1.3 ICMPv6 or IPv6 Extension Header Tunneling
1.3.2 Insider Threats [OR]
1.3.2.1 Rogue employees using USB exfiltration (Rubber Ducky)
1.3.2.2 Compromised contractors with excessive access
1.3.2.3 Abusing approved data transfer tools
1.4 Persistence & Evasion [OR]
1.4.1 Fileless Malware [OR]
1.4.1.1 PowerShell/Cobalt Strike in-memory execution
1.4.1.2 Linux rootkits (Symbiote, 2022)
1.4.1.3 Abusing legitimate admin tools (LOLBins)
1.4.2 Cloud Backdoors [OR]
1.4.2.1 Malicious Lambda functions (AWS)
1.4.2.2 Hidden service accounts in Google Workspace
1.4.2.3 Persistent VNC/RDP via cloud instances
1.5 Counter-Forensics [OR]
1.5.1 Log Manipulation [OR]
1.5.1.1 SIEM poisoning (injecting fake logs)
1.5.1.2 Deleting AWS CloudTrail or Azure Activity Logs
1.5.1.3 Using cloud API keys with excessive permissions
1.5.2 AI-Assisted Evasion [OR]
1.5.2.1 AI-generated fake traffic (mimicking normal behaviour)
1.5.2.2 Deepfake video calls to bypass MFA
1.5.2.3 AI-powered password spraying attacks
2. Protocol-Specific Attacks [OR]
2.1 IPv4-Specific Attacks [OR]
2.1.1 IP Fragmentation Attacks [OR]
2.1.1.1 Teardrop attacks causing kernel panics
2.1.1.2 Overlapping fragment firewall evasion
2.1.2 ICMP Abuse [OR]
2.1.2.1 Smurf attacks (amplification via broadcast)
2.1.2.2 ICMP tunneling for data exfiltration
2.1.3 ARP Spoofing/Poisoning [OR]
2.1.3.1 Gratuitous ARP for Man-in-the-Middle
2.1.3.2 ARP cache poisoning for DoS
2.1.4 NAT Abuse [OR]
2.1.4.1 NAT state table exhaustion attacks
2.1.4.2 NAT traversal techniques for unauthorized access
2.2 IPv6-Specific Attacks [OR]
2.2.1 SLAAC & RA Attacks [OR]
2.2.1.1 Rogue Router Advertisements (MitM)
2.2.1.2 RA flooding for DoS
2.2.2 NDP Exploitation [OR]
2.2.2.1 Neighbor Advertisement spoofing
2.2.2.2 Duplicate Address Detection (DAD) DoS
2.2.3 Extension Header Abuse [OR]
2.2.3.1 Firewall evasion using Hop-by-Hop options
2.2.3.2 Resource exhaustion via complex header chains
2.2.3.3 Covert channel via Traffic Class / Flow Label (exfiltrate information in unused header fields)
2.2.4 Dual-Stack Attacks [OR]
2.2.4.1 Bypassing IPv4 security via unmonitored IPv6
2.2.4.2 Tunneling IPv4 over IPv6 for evasion
2.3 Protocol-Agnostic Attacks [OR]
2.3.1 IP Spoofing & DDoS Amplification [OR]
2.3.1.1 DNS/NTP reflection attacks
2.3.1.2 TCP middlebox amplification (SYN-ACK)
2.3.2 BGP Hijacking & Route Leaks [OR]
2.3.2.1 Prefix hijacking for traffic interception
2.3.2.2 Route leaks causing traffic blackholes
2.3.3 TTL Expiry Attacks [OR]
2.3.3.1 ICMP Time Exceeded flooding
2.3.3.2 TTL-based resource exhaustion
2.3.4 Geolocation Spoofing [OR]
2.3.4.1 Proxy/VPN evasion of geo-blocks
2.3.4.2 ASN spoofing for trust exploitation
Risk table¶
Attack Path |
Technical Complexity |
Resources Required |
Risk Level |
Notes |
---|---|---|---|---|
1.1.1.1 Spear Phishing (PDF/Excel malware) |
Medium |
Low |
Medium |
Requires some social engineering skills; low cost but can bypass antivirus if well-crafted. |
1.1.1.2 BEC with deepfake audio/video |
High |
Medium |
High |
AI tools needed for realistic deepfakes; targeted attacks on executives. |
1.1.1.3 LinkedIn/Twitter impersonation |
Medium |
Low |
Medium |
Relatively simple, relies on human error; can harvest credentials for further attacks. |
1.1.2.1 Exposed S3/Azure buckets |
Low |
Low |
Medium |
Exploitable if public misconfigurations exist; low effort but impact varies. |
1.1.2.2 Misconfigured GitHub/GitLab repos |
Medium |
Low |
Medium |
Requires reconnaissance and some automation; easy to detect if logging exists. |
1.1.2.3 Publicly exposed Kubernetes API servers |
High |
Medium |
High |
Needs knowledge of Kubernetes; can lead to cluster compromise. |
1.1.3.1 Dependency confusion |
High |
Medium |
High |
Requires control over package repos; can scale to multiple victims. |
1.1.3.2 Compromised SaaS vendors |
High |
High |
High |
Complex supply chain attack; hard to execute but high payoff. |
1.1.3.3 Compromised software update mechanisms |
Very High |
High |
Very High |
Extremely difficult, but can compromise all users of software. |
1.2.1.1 RCE in enterprise VPNs |
Very High |
Medium |
High |
Exploiting zero-days requires research; potentially devastating. |
1.2.1.2 Windows/Linux privilege escalation |
High |
Low |
High |
Commonly automated; requires some OS-level knowledge. |
1.2.1.3 Exploiting IPv6 NDP/SLAAC flaws |
High |
Medium |
High |
Requires IPv6-enabled networks; less common but impactful. |
1.2.2.1 OAuth token hijacking |
High |
Medium |
High |
Needs phishing or token capture; cloud credentials can grant full access. |
1.2.2.2 Shadow API abuse |
Very High |
High |
Very High |
Undocumented APIs are tricky to discover; potential for serious cloud compromise. |
1.2.2.3 Privileged role assignment abuse |
Medium |
Medium |
Medium |
Relies on misconfigured permissions; often simple to escalate privileges if misconfig exists. |
1.3.1.1 DNS tunneling (DoH/DoT) |
Medium |
Low |
Medium |
Can bypass network monitoring; low resource cost. |
1.3.1.2 Legitimate cloud services exfiltration |
Low |
Low |
Medium |
Easy to blend in; detection depends on monitoring. |
1.3.1.3 ICMPv6/IPv6 extension header tunneling |
High |
Medium |
High |
Requires advanced networking knowledge; stealthy. |
1.3.2.1 Rogue employees using USB |
Low |
Low |
Medium |
Hard to prevent; physical controls required. |
1.3.2.2 Compromised contractors |
Medium |
Medium |
Medium |
Insider risk; depends on trust model. |
1.3.2.3 Abusing approved data transfer tools |
Medium |
Low |
Medium |
Often overlooked; requires user credentials. |
1.4.1.1 PowerShell/Cobalt Strike in-memory execution |
High |
Medium |
High |
Requires endpoint access; evades most AV. |
1.4.1.2 Linux rootkits (Symbiote) |
Very High |
Medium |
High |
Hard to detect/remove; requires admin access. |
1.4.1.3 Abusing admin tools (LOLBins) |
Medium |
Low |
Medium |
Simple but effective; depends on monitoring. |
1.4.2.1 Malicious Lambda functions |
High |
Medium |
High |
Cloud-specific persistence; needs developer access. |
1.4.2.2 Hidden service accounts in Google Workspace |
Medium |
Low |
Medium |
Persistent access; easy to hide without monitoring. |
1.4.2.3 Persistent VNC/RDP via cloud instances |
Medium |
Medium |
Medium |
Maintains access; requires cloud resources. |
1.5.1.1 SIEM poisoning |
High |
Medium |
High |
Manipulates logs; requires access to logging infrastructure. |
1.5.1.2 Deleting CloudTrail/Activity Logs |
Medium |
Medium |
Medium |
Simple if permissions exist; detection risk high. |
1.5.1.3 Using cloud API keys with excessive permissions |
Medium |
Low |
Medium |
Opportunistic; can lead to privilege abuse. |
1.5.2.1 AI-generated fake traffic |
Very High |
Medium |
High |
Needs AI modelling; evades anomaly detection. |
1.5.2.2 Deepfake video calls to bypass MFA |
Very High |
High |
Very High |
Sophisticated attack; requires real-time AI. |
1.5.2.3 AI-powered password spraying |
Medium |
Medium |
Medium |
Automates common attacks; detection depends on rate limits. |
2.1.1.1 Teardrop attacks |
Medium |
Low |
Medium |
Classic DoS; mitigated on modern OSes. |
2.1.1.2 Overlapping fragment firewall evasion |
High |
Medium |
High |
Needs careful crafting; firewall-specific. |
2.1.2.1 Smurf attacks |
Low |
Medium |
Medium |
Low complexity, needs broadcast network. |
2.1.2.2 ICMP tunneling |
Medium |
Medium |
Medium |
For data exfiltration; requires stealth. |
2.1.3.1 Gratuitous ARP (MitM) |
Medium |
Low |
Medium |
Effective on LANs; physical access often required. |
2.1.3.2 ARP cache poisoning (DoS) |
Low |
Low |
Low |
Limited scope; easily detectable. |
2.1.4.1 NAT table exhaustion |
Medium |
Medium |
Medium |
Targets network devices; resource-limited. |
2.1.4.2 NAT traversal for unauthorized access |
Medium |
Medium |
Medium |
Exploits existing NAT behaviour; technical knowledge required. |
2.2.1.1 Rogue RA (MitM) |
High |
Medium |
High |
Requires IPv6 knowledge; can intercept traffic. |
2.2.1.2 RA flooding for DoS |
Medium |
Medium |
Medium |
Localised impact; network resources needed. |
2.2.2.1 Neighbor Advertisement spoofing |
High |
Medium |
High |
Network-level attack; stealth varies. |
2.2.2.2 DAD DoS |
Medium |
Medium |
Medium |
Can disrupt IPv6 address assignment; requires network access. |
2.2.3.1 Hop-by-Hop firewall evasion |
High |
Medium |
High |
Sophisticated; requires deep packet crafting. |
2.2.3.2 Complex header resource exhaustion |
High |
Medium |
High |
Can cause device/network failure; technical expertise needed. |
2.2.4.1 Bypassing IPv4 security via unmonitored IPv6 |
Medium |
Medium |
Medium |
Exploits misconfiguration; easier in dual-stack networks. |
2.2.4.2 Tunneling IPv4 over IPv6 |
Medium |
Medium |
Medium |
Requires network skill; detection depends on monitoring. |
2.3.1.1 DNS/NTP reflection attacks |
Medium |
Medium |
Medium |
Classic DDoS; amplification multiplies effect. |
2.3.1.2 TCP middlebox amplification |
High |
Medium |
High |
Needs specific network targets; effective but targeted. |
2.3.2.1 BGP prefix hijacking |
Very High |
High |
Very High |
Requires access to routing infrastructure; high impact. |
2.3.2.2 Route leaks causing blackholes |
High |
Medium |
High |
Misconfig-driven; limited but disruptive. |
2.3.3.1 ICMP Time Exceeded flooding |
Medium |
Medium |
Medium |
Can congest network; limited to TTL expiry. |
2.3.3.2 TTL-based resource exhaustion |
Medium |
Medium |
Medium |
Needs high packet rates; detectable. |
2.3.4.1 Proxy/VPN geo evasion |
Low |
Low |
Low |
Simple; mainly circumvents restrictions. |
2.3.4.2 ASN spoofing |
High |
Medium |
High |
Requires BGP knowledge; trickier than geo-spoofing. |