| Home > CAPEC List > CAPEC-383: Harvesting Information via API Event Monitoring (Version 3.9) |
|
Low
| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 407 | Pretexting |
| CanPrecede | Meta Attack PatternMeta Attack Pattern - A meta level attack pattern in CAPEC is a decidedly abstract characterization of a specific methodology or technique used in an attack. A meta attack pattern is often void of a specific technology or implementation and is meant to provide an understanding of a high level approach. A meta level attack pattern is a generalization of related group of standard level attack patterns. Meta level attack patterns are particularly useful for architecture and design level threat modeling exercises. | 94 | Adversary in the Middle (AiTM) |
| View Name | Top Level Categories |
|---|---|
| Domains of Attack | Software, Social Engineering |
| Mechanisms of Attack | Engage in Deceptive Interactions, Collect and Analyze Information |
| Scope | Impact | Likelihood |
|---|---|---|
Confidentiality | Read Data |
| CWE-ID | Weakness Name |
|---|---|
| 311 | Missing Encryption of Sensitive Data |
| 319 | Cleartext Transmission of Sensitive Information |
| 419 | Unprotected Primary Channel |
| 602 | Client-Side Enforcement of Server-Side Security |
| Entry ID | Entry Name |
|---|---|
| 1056.004 | Input Capture: Credential API Hooking |
| Submissions | |||
|---|---|---|---|
| Submission Date | Submitter | Organization | |
| 2014年06月23日 (Version 2.6) | CAPEC Content Team | The MITRE Corporation | |
| Modifications | |||
| Modification Date | Modifier | Organization | |
| 2018年07月31日 (Version 2.12) | CAPEC Content Team | The MITRE Corporation | |
| Updated Attack_Motivation-Consequences, Attack_Prerequisites, Description Summary, Related_Attack_Patterns, Resources_Required, Solutions_and_Mitigations | |||
| 2019年04月04日 (Version 3.1) | CAPEC Content Team | The MITRE Corporation | |
| Updated Related_Attack_Patterns | |||
| 2020年12月17日 (Version 3.4) | CAPEC Content Team | The MITRE Corporation | |
| Updated Resources_Required | |||
| 2021年06月24日 (Version 3.5) | CAPEC Content Team | The MITRE Corporation | |
| Updated Description | |||
| 2022年09月29日 (Version 3.8) | CAPEC Content Team | The MITRE Corporation | |
| Updated Related_Attack_Patterns, Taxonomy_Mappings | |||
| Previous Entry Names | |||
| Change Date | Previous Entry Name | ||
| 2018年07月31日 (Version 2.12) | Harvesting Usernames or UserIDs via Application API Event Monitoring | ||
|
Use of the Common Attack Pattern Enumeration and Classification (CAPEC), and the associated references from this website are subject to the Terms of Use. Copyright © 2007–2025, The MITRE Corporation. CAPEC and the CAPEC logo are trademarks of The MITRE Corporation. |
||