| Home > CAPEC List > CAPEC-143: Detect Unpublicized Web Pages (Version 3.9) |
|
Low
| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 150 | Collect Data from Common Resource Locations |
| View Name | Top Level Categories |
|---|---|
| Domains of Attack | Software |
| Mechanisms of Attack | Collect and Analyze Information |
Find target web site: An adversary finds a target web site that they think may have unpublicized web pages
Map the published web site: The adversary will map the published web site either by using an automated tool or by manually accessing well-known debugging or logging pages, or otherwise predictable pages within the site tree
| Techniques |
|---|
| Use Dirbuster to brute force directories and file names to find unpublicized pages |
| Find a pattern in the naming of documents and extrapolate this pattern to discover additional documents that have been created but are no longer externally linked |
Try to find weaknesses or information: The adversary will try to find weaknesses or information on the unpublicized pages that the targeted site did not intend to be public
| Techniques |
|---|
| Manually analyze files or pages for information that could be useful in a further attack |
| Use a static analysis tool to find weaknesses in unpublished web pages |
Follow-up attack: Use any information or weaknesses found to carry out a follow-up attack
| CWE-ID | Weakness Name |
|---|---|
| 425 | Direct Request ('Forced Browsing') |
| Submissions | ||
|---|---|---|
| Submission Date | Submitter | Organization |
| 2014年06月23日 (Version 2.6) | CAPEC Content Team | The MITRE Corporation |
| Modifications | ||
| Modification Date | Modifier | Organization |
| 2015年12月07日 (Version 2.8) | CAPEC Content Team | The MITRE Corporation |
| Updated Related_Attack_Patterns | ||
| 2019年09月30日 (Version 3.2) | CAPEC Content Team | The MITRE Corporation |
| Updated Related_Attack_Patterns | ||
| 2020年07月30日 (Version 3.3) | CAPEC Content Team | The MITRE Corporation |
| Updated Related_Attack_Patterns | ||
| 2021年10月21日 (Version 3.6) | CAPEC Content Team | The MITRE Corporation |
| Updated Description, Execution_Flow | ||
| 2023年01月24日 (Version 3.9) | CAPEC Content Team | The MITRE Corporation |
| Updated Related_Weaknesses | ||
|
Use of the Common Attack Pattern Enumeration and Classification (CAPEC), and the associated references from this website are subject to the Terms of Use. Copyright © 2007–2025, The MITRE Corporation. CAPEC and the CAPEC logo are trademarks of The MITRE Corporation. |
||