• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

War Room

Shells from above

RSM logo

  • Home
  • About
  • Blog
  • Talks/Whitepapers
  • Tools
  • Recreation
Home > Attack Vectors > 2022 Attack Vectors Report

2022 Attack Vectors Report

October 27, 2022 By RSM Author

For many years, RSM has made a continuous effort to assist organizations in addressing cybersecurity challenges, provide tools to achieve a desired state of security, and deliver guidance for attack prevention. We perform security penetration testing to simulate attacks on internal networks and closely mimic security breaches within controlled environments. By conducting these assessments, we seek to determine the level of compromise that an attacker may achieve, while investigating the data accessible to malicious intruders.Attack Vectors Report 2022

Based on an analysis of external and internal penetration tests from 2019-2021, we have created the 2022 Attack Vectors Report. For the first time, our Attack Vectors report also features analysis of penetration tests through the lens of maturity assessments.

In other words, how does the cybersecurity maturity of an organization affect our ability to compromise their network?

We collated data from 257 external penetration tests and 183 internal penetration tests, all from organizations for whom we also performed maturity assessments. We then broke down the most common attack vectors that we used to compromise real networks, from LLMNR/NBT-NS spoofing to Kerberoasting.

Each attack vector also shows the business risks and impact of successful attacks, as well as steps to remediate the vulnerabilities that allow for those attacks.

If you have any questions regarding this report, please contact RSM US LLP. For additional information about our penetration testing services or reporting processes, please visit the RSM website.  

Share this...
  • Reddit
  • Email
  • Facebook
  • Twitter
  • Linkedin

RSM Author

Primary Sidebar

Categories

  • Defense
  • Forensics
  • Offense
  • Physical
  • R&D

Most Viewed Posts

  • DLL Injection Part 1: SetWindowsHookEx 10.8k views
  • Sophos UTM Home Edition – 3 – The Setup 10.8k views
  • Leveraging MS16-032 with PowerShell Empire 10k views
  • Bypassing Gmail’s Malicious Macro Signatures 9.8k views
  • How to Bypass SEP with Admin Access 8.9k views

Footer

  • RSS
  • Twitter
  • Tools
  • About
  • RSM US LLP

+1 800 903 6264

1 S Wacker Dr Suite 800
Chicago, IL 60606

Copyright © 2023 RSM US LLP. All rights reserved. RSM US LLP is a limited liability partnership and the U.S. member firm of RSM International, a global network of independent audit, tax and consulting firms. The member firms of RSM International collaborate to provide services to global clients, but are separate and distinct legal entities that cannot obligate each other. Each member firm is responsible only for its own acts and omissions, and not those of any other party. Visit for more information regarding RSM US LLP and RSM International.