| Home > CAPEC List > CAPEC-37: Retrieve Embedded Sensitive Data (Version 3.9) |
|
High
Very High
| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 167 | White Box Reverse Engineering |
| CanFollow | Detailed Attack PatternDetailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal. | 65 | Sniff Application Code |
| CanFollow | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 675 | Retrieve Data from Decommissioned Devices |
| View Name | Top Level Categories |
|---|---|
| Domains of Attack | Software, Hardware, Physical Security |
| Mechanisms of Attack | Collect and Analyze Information |
Identify Target: Attacker identifies client components to extract information from. These may be binary executables, class files, shared libraries (e.g., DLLs), configuration files, or other system files.
| Techniques |
|---|
| Binary file extraction. The attacker extracts binary files from zips, jars, wars, PDFs or other composite formats. |
| Package listing. The attacker uses a package manifest provided with the software installer, or the filesystem itself, to identify component files suitable for attack. |
Retrieve Embedded Data: The attacker then uses a variety of techniques, such as sniffing, reverse-engineering, and cryptanalysis to retrieve the information of interest.
| Techniques |
|---|
| API Profiling. The attacker monitors the software's use of registry keys or other operating system-provided storage locations that can contain sensitive information. |
| Execution in simulator. The attacker physically removes mass storage from the system and explores it using a simulator, external system, or other debugging harness. |
| Common decoding methods. The attacker applies methods to decode such encodings and compressions as Base64, unzip, unrar, RLE decoding, gzip decompression and so on. |
| Common data typing. The attacker looks for common file signatures for well-known file types (JPEG, TIFF, ASN.1, LDIF, etc.). If the signatures match, they attempt decoding in that format. |
| Scope | Impact | Likelihood |
|---|---|---|
Confidentiality | Read Data | |
Integrity | Modify Data | |
Confidentiality Access Control Authorization | Gain Privileges |
| CWE-ID | Weakness Name |
|---|---|
| 226 | Sensitive Information in Resource Not Removed Before Reuse |
| 311 | Missing Encryption of Sensitive Data |
| 525 | Use of Web Browser Cache Containing Sensitive Information |
| 312 | Cleartext Storage of Sensitive Information |
| 314 | Cleartext Storage in the Registry |
| 315 | Cleartext Storage of Sensitive Information in a Cookie |
| 318 | Cleartext Storage of Sensitive Information in Executable |
| 1239 | Improper Zeroization of Hardware Register |
| 1258 | Exposure of Sensitive System Information Due to Uncleared Debug Information |
| 1266 | Improper Scrubbing of Sensitive Data from Decommissioned Device |
| 1272 | Sensitive Information Uncleared Before Debug/Power State Transition |
| 1278 | Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques |
| 1301 | Insufficient or Incomplete Data Removal within Hardware Component |
| 1330 | Remanent Data Readable after Memory Erase |
| Entry ID | Entry Name |
|---|---|
| 1005 | Data from Local System |
| 1552.004 | Unsecured Credentials: Private Keys |
| Submissions | |||
|---|---|---|---|
| Submission Date | Submitter | Organization | |
| 2014年06月23日 (Version 2.6) | CAPEC Content Team | The MITRE Corporation | |
| Modifications | |||
| Modification Date | Modifier | Organization | |
| 2015年11月09日 (Version 2.7) | CAPEC Content Team | The MITRE Corporation | |
| Updated Activation_Zone, Attack_Phases, Attack_Prerequisites, Description Summary, Injection_Vector, Payload, Payload_Activation_Impact, Related_Vulnerabilities, Resources_Required | |||
| 2020年07月30日 (Version 3.3) | CAPEC Content Team | The MITRE Corporation | |
| Updated Execution_Flow, Related_Weaknesses, Taxonomy_Mappings | |||
| 2020年12月17日 (Version 3.4) | CAPEC Content Team | The MITRE Corporation | |
| Updated Related_Weaknesses | |||
| 2021年06月24日 (Version 3.5) | CAPEC Content Team | The MITRE Corporation | |
| Updated Related_Weaknesses | |||
| 2022年02月22日 (Version 3.7) | CAPEC Content Team | The MITRE Corporation | |
| Updated Execution_Flow | |||
| 2022年09月29日 (Version 3.8) | CAPEC Content Team | The MITRE Corporation | |
| Updated Taxonomy_Mappings | |||
| Previous Entry Names | |||
| Change Date | Previous Entry Name | ||
| 2015年11月09日 (Version 2.7) | Lifting Data Embedded in Client Distributions | ||
|
Use of the Common Attack Pattern Enumeration and Classification (CAPEC), and the associated references from this website are subject to the Terms of Use. Copyright © 2007–2025, The MITRE Corporation. CAPEC and the CAPEC logo are trademarks of The MITRE Corporation. |
||