Skip to main content
. 2022 Nov 2;82(11):16951–16971. doi: 10.1007/s11042-022-14036-y

Table 1.

Environments and attack vectors of threat agents

Environments used by a threat agent to exploit the network Attack vectors of threat agents
Windows 10. Physical.
Windows 8. Network.
Linux Kernel Version. Adjacent.
MY SQL. Local.
Post Gres.
Apache.
Apple (Xcode 1.5).
Samba (2.18.13).