| Home > CAPEC List > CAPEC-545: Pull Data from System Resources (Version 3.9) |
|
| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | Meta Attack PatternMeta Attack Pattern - A meta level attack pattern in CAPEC is a decidedly abstract characterization of a specific methodology or technique used in an attack. A meta attack pattern is often void of a specific technology or implementation and is meant to provide an understanding of a high level approach. A meta level attack pattern is a generalization of related group of standard level attack patterns. Meta level attack patterns are particularly useful for architecture and design level threat modeling exercises. | 116 | Excavation |
| ParentOf | Detailed Attack PatternDetailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal. | 498 | Probe iOS Screenshots |
| ParentOf | Detailed Attack PatternDetailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal. | 546 | Incomplete Data Deletion in a Multi-Tenant Environment |
| ParentOf | Detailed Attack PatternDetailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal. | 634 | Probe Audio and Video Peripherals |
| ParentOf | Detailed Attack PatternDetailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal. | 639 | Probe System Files |
| CanFollow | Detailed Attack PatternDetailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal. | 561 | Windows Admin Shares with Stolen Credentials |
| CanFollow | Detailed Attack PatternDetailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal. | 643 | Identify Shared Files/Directories on System |
| CanFollow | Detailed Attack PatternDetailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal. | 644 | Use of Captured Hashes (Pass The Hash) |
| View Name | Top Level Categories |
|---|---|
| Domains of Attack | Software, Hardware |
| Mechanisms of Attack | Collect and Analyze Information |
| CWE-ID | Weakness Name |
|---|---|
| 1239 | Improper Zeroization of Hardware Register |
| 1243 | Sensitive Non-Volatile Information Not Protected During Debug |
| 1258 | Exposure of Sensitive System Information Due to Uncleared Debug Information |
| 1266 | Improper Scrubbing of Sensitive Data from Decommissioned Device |
| 1272 | Sensitive Information Uncleared Before Debug/Power State Transition |
| 1278 | Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques |
| 1323 | Improper Management of Sensitive Trace Data |
| 1258 | Exposure of Sensitive System Information Due to Uncleared Debug Information |
| 1330 | Remanent Data Readable after Memory Erase |
| Entry ID | Entry Name |
|---|---|
| 1005 | Data from Local System |
| 1555.001 | Credentials from Password Stores:Keychain |
| Submissions | |||
|---|---|---|---|
| Submission Date | Submitter | Organization | |
| 2014年06月23日 (Version 2.6) | CAPEC Content Team | The MITRE Corporation | |
| Modifications | |||
| Modification Date | Modifier | Organization | |
| 2015年11月09日 (Version 2.7) | CAPEC Content Team | The MITRE Corporation | |
| Updated Description Summary, References | |||
| 2015年12月07日 (Version 2.8) | CAPEC Content Team | The MITRE Corporation | |
| Updated Description Summary | |||
| 2019年09月30日 (Version 3.2) | CAPEC Content Team | The MITRE Corporation | |
| Updated Related_Attack_Patterns | |||
| 2020年07月30日 (Version 3.3) | CAPEC Content Team | The MITRE Corporation | |
| Updated Related_Weaknesses, Taxonomy_Mappings | |||
| 2020年12月17日 (Version 3.4) | CAPEC Content Team | The MITRE Corporation | |
| Updated Related_Weaknesses | |||
| 2021年06月24日 (Version 3.5) | CAPEC Content Team | The MITRE Corporation | |
| Updated Related_Attack_Patterns, Taxonomy_Mappings | |||
| 2022年09月29日 (Version 3.8) | CAPEC Content Team | The MITRE Corporation | |
| Updated Taxonomy_Mappings | |||
| 2023年01月24日 (Version 3.9) | CAPEC Content Team | The MITRE Corporation | |
| Updated Related_Weaknesses | |||
| Previous Entry Names | |||
| Change Date | Previous Entry Name | ||
| 2015年11月09日 (Version 2.7) | Probe Application Queries | ||
|
Use of the Common Attack Pattern Enumeration and Classification (CAPEC), and the associated references from this website are subject to the Terms of Use. Copyright © 2007–2025, The MITRE Corporation. CAPEC and the CAPEC logo are trademarks of The MITRE Corporation. |
||