instruction
stringlengths
20
156
context
stringclasses
37 values
response
stringlengths
73
869
category
stringclasses
11 values
language
stringclasses
2 values
difficulty
stringclasses
4 values
source
stringclasses
8 values
id
stringlengths
14
14
What is Accessing Functionality Not Properly Constrained by ACLs (CAPEC-1) attack pattern?
CAPEC
Accessing Functionality Not Properly Constrained by ACLs (CAPEC-1): In applications, particularly web applications, access to functionality is mitigated by an authorization framework. This framework maps Access Control Lists (ACLs) to elements of the application's functionality; particularly URL's for web apps. In the case that the administrator failed to specify an ACL for a particular element, an attacker may be able to access it with impunity. An attacker with the ability to access functionality not properly constrained by ACLs can obtain sensitive information and possibly compromise the entire application. Such an attacker can access resources that must be
web_security
en
intermediate
capec
kwcyber_000000
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Accessing Functionality Not Properly Constrained by ACLs (CAPEC-1)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Accessing Functionality Not Properly Constrained by ACLs (CAPEC-1): In applications, particularly web applications, access to functionality is mitigated by an authorization framework. This framework maps Access Control Lists (ACLs) to elements of the application's functionality; particularly URL's for web apps. In the case that the administrator failed to specify an ACL for a particular element, an attacker may be able to access it with impunity. An attacker with the ability to access functionality not properly constrained by ACLs can obtain sensitive information and possibly compromise the entire application. Such an attacker can access resources that must be
web_security
ar
intermediate
capec
kwcyber_000001
How does Accessing Functionality Not Properly Constrained by ACLs attack work?
Attack Analysis
Technical analysis of Accessing Functionality Not Properly Constrained by ACLs (CAPEC-1): In applications, particularly web applications, access to functionality is mitigated by an authorization framework. This framework maps Access Control Lists (ACLs) to elements of the application's functionality; particularly URL's for web apps. In the case that the administrator failed to specify an ACL for a particular element, an attacker may be able to access it with impunity. An attacker with the ability to access functionality not properly constrained by ACLs can obtain sensitive information and possibly compromise the entire application. Such an attacker can access resources that must be
web_security
en
advanced
capec
kwcyber_000002
What is Buffer Overflow via Environment Variables (CAPEC-10) attack pattern?
CAPEC
Buffer Overflow via Environment Variables (CAPEC-10): This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the adversary finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
web_security
en
intermediate
capec
kwcyber_000003
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Buffer Overflow via Environment Variables (CAPEC-10)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Buffer Overflow via Environment Variables (CAPEC-10): This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the adversary finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
web_security
ar
intermediate
capec
kwcyber_000004
How does Buffer Overflow via Environment Variables attack work?
Attack Analysis
Technical analysis of Buffer Overflow via Environment Variables (CAPEC-10): This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the adversary finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
web_security
en
advanced
capec
kwcyber_000005
What is Overflow Buffers (CAPEC-100) attack pattern?
CAPEC
Overflow Buffers (CAPEC-100): Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an adversary. As a consequence, an adversary is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the adversaries' choice.
web_security
en
intermediate
capec
kwcyber_000006
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Overflow Buffers (CAPEC-100)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Overflow Buffers (CAPEC-100): Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an adversary. As a consequence, an adversary is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the adversaries' choice.
web_security
ar
intermediate
capec
kwcyber_000007
How does Overflow Buffers attack work?
Attack Analysis
Technical analysis of Overflow Buffers (CAPEC-100): Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an adversary. As a consequence, an adversary is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the adversaries' choice.
web_security
en
advanced
capec
kwcyber_000008
What is Server Side Include (SSI) Injection (CAPEC-101) attack pattern?
CAPEC
Server Side Include (SSI) Injection (CAPEC-101): An attacker can use Server Side Include (SSI) Injection to send code to a web application that then gets executed by the web server. Doing so enables the attacker to achieve similar results to Cross Site Scripting, viz., arbitrary code execution and information disclosure, albeit on a more limited scale, since the SSI directives are nowhere near as powerful as a full-fledged scripting language. Nonetheless, the attacker can conveniently gain access to sensitive files, such as password files, and execute shell commands.
web_security
en
intermediate
capec
kwcyber_000009
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Server Side Include (SSI) Injection (CAPEC-101)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Server Side Include (SSI) Injection (CAPEC-101): An attacker can use Server Side Include (SSI) Injection to send code to a web application that then gets executed by the web server. Doing so enables the attacker to achieve similar results to Cross Site Scripting, viz., arbitrary code execution and information disclosure, albeit on a more limited scale, since the SSI directives are nowhere near as powerful as a full-fledged scripting language. Nonetheless, the attacker can conveniently gain access to sensitive files, such as password files, and execute shell commands.
web_security
ar
intermediate
capec
kwcyber_000010
How does Server Side Include (SSI) Injection attack work?
Attack Analysis
Technical analysis of Server Side Include (SSI) Injection (CAPEC-101): An attacker can use Server Side Include (SSI) Injection to send code to a web application that then gets executed by the web server. Doing so enables the attacker to achieve similar results to Cross Site Scripting, viz., arbitrary code execution and information disclosure, albeit on a more limited scale, since the SSI directives are nowhere near as powerful as a full-fledged scripting language. Nonetheless, the attacker can conveniently gain access to sensitive files, such as password files, and execute shell commands.
web_security
en
advanced
capec
kwcyber_000011
What is Session Sidejacking (CAPEC-102) attack pattern?
CAPEC
Session Sidejacking (CAPEC-102): Session sidejacking takes advantage of an unencrypted communication channel between a victim and target system. The attacker sniffs traffic on a network looking for session tokens in unencrypted traffic. Once a session token is captured, the attacker performs malicious actions by using the stolen token with the targeted application to impersonate the victim. This attack is a specific method of session hijacking, which is exploiting a valid session token to gain unauthorized access to a target system or information. Other methods to perform a session hijacking are session fixation, cross-site s
web_security
en
intermediate
capec
kwcyber_000012
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Session Sidejacking (CAPEC-102)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Session Sidejacking (CAPEC-102): Session sidejacking takes advantage of an unencrypted communication channel between a victim and target system. The attacker sniffs traffic on a network looking for session tokens in unencrypted traffic. Once a session token is captured, the attacker performs malicious actions by using the stolen token with the targeted application to impersonate the victim. This attack is a specific method of session hijacking, which is exploiting a valid session token to gain unauthorized access to a target system or information. Other methods to perform a session hijacking are session fixation, cross-site s
web_security
ar
intermediate
capec
kwcyber_000013
How does Session Sidejacking attack work?
Attack Analysis
Technical analysis of Session Sidejacking (CAPEC-102): Session sidejacking takes advantage of an unencrypted communication channel between a victim and target system. The attacker sniffs traffic on a network looking for session tokens in unencrypted traffic. Once a session token is captured, the attacker performs malicious actions by using the stolen token with the targeted application to impersonate the victim. This attack is a specific method of session hijacking, which is exploiting a valid session token to gain unauthorized access to a target system or information. Other methods to perform a session hijacking are session fixation, cross-site s
web_security
en
advanced
capec
kwcyber_000014
What is Clickjacking (CAPEC-103) attack pattern?
CAPEC
Clickjacking (CAPEC-103): An adversary tricks a victim into unknowingly initiating some action in one system while interacting with the UI from a seemingly completely different, usually an adversary controlled or intended, system.
web_security
en
intermediate
capec
kwcyber_000015
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Clickjacking (CAPEC-103)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Clickjacking (CAPEC-103): An adversary tricks a victim into unknowingly initiating some action in one system while interacting with the UI from a seemingly completely different, usually an adversary controlled or intended, system.
web_security
ar
intermediate
capec
kwcyber_000016
How does Clickjacking attack work?
Attack Analysis
Technical analysis of Clickjacking (CAPEC-103): An adversary tricks a victim into unknowingly initiating some action in one system while interacting with the UI from a seemingly completely different, usually an adversary controlled or intended, system.
web_security
en
advanced
capec
kwcyber_000017
What is Cross Zone Scripting (CAPEC-104) attack pattern?
CAPEC
Cross Zone Scripting (CAPEC-104): An attacker is able to cause a victim to load content into their web-browser that bypasses security zone controls and gain access to increased privileges to execute scripting code or other web objects such as unsigned ActiveX controls or applets. This is a privilege elevation attack targeted at zone-based web-browser security.
web_security
en
intermediate
capec
kwcyber_000018
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Cross Zone Scripting (CAPEC-104)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Cross Zone Scripting (CAPEC-104): An attacker is able to cause a victim to load content into their web-browser that bypasses security zone controls and gain access to increased privileges to execute scripting code or other web objects such as unsigned ActiveX controls or applets. This is a privilege elevation attack targeted at zone-based web-browser security.
web_security
ar
intermediate
capec
kwcyber_000019
How does Cross Zone Scripting attack work?
Attack Analysis
Technical analysis of Cross Zone Scripting (CAPEC-104): An attacker is able to cause a victim to load content into their web-browser that bypasses security zone controls and gain access to increased privileges to execute scripting code or other web objects such as unsigned ActiveX controls or applets. This is a privilege elevation attack targeted at zone-based web-browser security.
web_security
en
advanced
capec
kwcyber_000020
What is HTTP Request Splitting (CAPEC-105) attack pattern?
CAPEC
HTTP Request Splitting (CAPEC-105): <xhtml:p>An adversary abuses the flexibility and discrepancies in the parsing and interpretation of HTTP Request messages by different intermediary HTTP agents (e.g., load balancer, reverse proxy, web caching proxies, application firewalls, etc.) to split a single HTTP request into multiple unauthorized and malicious HTTP requests to a back-end HTTP agent (e.g., web server).</xhtml:p> <xhtml:p>See CanPrecede relationships for possible consequences.</xhtml:p>
web_security
en
intermediate
capec
kwcyber_000021
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… HTTP Request Splitting (CAPEC-105)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… HTTP Request Splitting (CAPEC-105): <xhtml:p>An adversary abuses the flexibility and discrepancies in the parsing and interpretation of HTTP Request messages by different intermediary HTTP agents (e.g., load balancer, reverse proxy, web caching proxies, application firewalls, etc.) to split a single HTTP request into multiple unauthorized and malicious HTTP requests to a back-end HTTP agent (e.g., web server).</xhtml:p> <xhtml:p>See CanPrecede relationships for possible consequences.</xhtml:p>
web_security
ar
intermediate
capec
kwcyber_000022
How does HTTP Request Splitting attack work?
Attack Analysis
Technical analysis of HTTP Request Splitting (CAPEC-105): <xhtml:p>An adversary abuses the flexibility and discrepancies in the parsing and interpretation of HTTP Request messages by different intermediary HTTP agents (e.g., load balancer, reverse proxy, web caching proxies, application firewalls, etc.) to split a single HTTP request into multiple unauthorized and malicious HTTP requests to a back-end HTTP agent (e.g., web server).</xhtml:p> <xhtml:p>See CanPrecede relationships for possible consequences.</xhtml:p>
web_security
en
advanced
capec
kwcyber_000023
What is DEPRECATED: XSS through Log Files (CAPEC-106) attack pattern?
CAPEC
DEPRECATED: XSS through Log Files (CAPEC-106): This attack pattern has been deprecated as it referes to an existing chain relationship between "CAPEC-93 : Log Injection-Tampering-Forging" and "CAPEC-63 : Cross-Site Scripting". Please refer to these CAPECs going forward.
web_security
en
intermediate
capec
kwcyber_000024
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… DEPRECATED: XSS through Log Files (CAPEC-106)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… DEPRECATED: XSS through Log Files (CAPEC-106): This attack pattern has been deprecated as it referes to an existing chain relationship between "CAPEC-93 : Log Injection-Tampering-Forging" and "CAPEC-63 : Cross-Site Scripting". Please refer to these CAPECs going forward.
web_security
ar
intermediate
capec
kwcyber_000025
How does DEPRECATED: XSS through Log Files attack work?
Attack Analysis
Technical analysis of DEPRECATED: XSS through Log Files (CAPEC-106): This attack pattern has been deprecated as it referes to an existing chain relationship between "CAPEC-93 : Log Injection-Tampering-Forging" and "CAPEC-63 : Cross-Site Scripting". Please refer to these CAPECs going forward.
web_security
en
advanced
capec
kwcyber_000026
What is Cross Site Tracing (CAPEC-107) attack pattern?
CAPEC
Cross Site Tracing (CAPEC-107): Cross Site Tracing (XST) enables an adversary to steal the victim's session cookie and possibly other authentication credentials transmitted in the header of the HTTP request when the victim's browser communicates to a destination system's web server.
web_security
en
intermediate
capec
kwcyber_000027
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Cross Site Tracing (CAPEC-107)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Cross Site Tracing (CAPEC-107): Cross Site Tracing (XST) enables an adversary to steal the victim's session cookie and possibly other authentication credentials transmitted in the header of the HTTP request when the victim's browser communicates to a destination system's web server.
web_security
ar
intermediate
capec
kwcyber_000028
How does Cross Site Tracing attack work?
Attack Analysis
Technical analysis of Cross Site Tracing (CAPEC-107): Cross Site Tracing (XST) enables an adversary to steal the victim's session cookie and possibly other authentication credentials transmitted in the header of the HTTP request when the victim's browser communicates to a destination system's web server.
web_security
en
advanced
capec
kwcyber_000029
What is Command Line Execution through SQL Injection (CAPEC-108) attack pattern?
CAPEC
Command Line Execution through SQL Injection (CAPEC-108): An attacker uses standard SQL injection methods to inject data into the command line for execution. This could be done directly through misuse of directives such as MSSQL_xp_cmdshell or indirectly through injection of data into the database that would be interpreted as shell commands. Sometime later, an unscrupulous backend application (or could be part of the functionality of the same application) fetches the injected data stored in the database and uses this data as command line arguments without performing proper validation. The malicious data escapes that data plane by spawning new command
web_security
en
intermediate
capec
kwcyber_000030
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Command Line Execution through SQL Injection (CAPEC-108)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Command Line Execution through SQL Injection (CAPEC-108): An attacker uses standard SQL injection methods to inject data into the command line for execution. This could be done directly through misuse of directives such as MSSQL_xp_cmdshell or indirectly through injection of data into the database that would be interpreted as shell commands. Sometime later, an unscrupulous backend application (or could be part of the functionality of the same application) fetches the injected data stored in the database and uses this data as command line arguments without performing proper validation. The malicious data escapes that data plane by spawning new command
web_security
ar
intermediate
capec
kwcyber_000031
How does Command Line Execution through SQL Injection attack work?
Attack Analysis
Technical analysis of Command Line Execution through SQL Injection (CAPEC-108): An attacker uses standard SQL injection methods to inject data into the command line for execution. This could be done directly through misuse of directives such as MSSQL_xp_cmdshell or indirectly through injection of data into the database that would be interpreted as shell commands. Sometime later, an unscrupulous backend application (or could be part of the functionality of the same application) fetches the injected data stored in the database and uses this data as command line arguments without performing proper validation. The malicious data escapes that data plane by spawning new command
web_security
en
advanced
capec
kwcyber_000032
What is Object Relational Mapping Injection (CAPEC-109) attack pattern?
CAPEC
Object Relational Mapping Injection (CAPEC-109): An attacker leverages a weakness present in the database access layer code generated with an Object Relational Mapping (ORM) tool or a weakness in the way that a developer used a persistence framework to inject their own SQL commands to be executed against the underlying database. The attack here is similar to plain SQL injection, except that the application does not use JDBC to directly talk to the database, but instead it uses a data access layer generated by an ORM tool or framework (e.g. Hibernate). While most of the time code generated by an ORM tool contains safe access methods that are
web_security
en
intermediate
capec
kwcyber_000033
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Object Relational Mapping Injection (CAPEC-109)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Object Relational Mapping Injection (CAPEC-109): An attacker leverages a weakness present in the database access layer code generated with an Object Relational Mapping (ORM) tool or a weakness in the way that a developer used a persistence framework to inject their own SQL commands to be executed against the underlying database. The attack here is similar to plain SQL injection, except that the application does not use JDBC to directly talk to the database, but instead it uses a data access layer generated by an ORM tool or framework (e.g. Hibernate). While most of the time code generated by an ORM tool contains safe access methods that are
web_security
ar
intermediate
capec
kwcyber_000034
How does Object Relational Mapping Injection attack work?
Attack Analysis
Technical analysis of Object Relational Mapping Injection (CAPEC-109): An attacker leverages a weakness present in the database access layer code generated with an Object Relational Mapping (ORM) tool or a weakness in the way that a developer used a persistence framework to inject their own SQL commands to be executed against the underlying database. The attack here is similar to plain SQL injection, except that the application does not use JDBC to directly talk to the database, but instead it uses a data access layer generated by an ORM tool or framework (e.g. Hibernate). While most of the time code generated by an ORM tool contains safe access methods that are
web_security
en
advanced
capec
kwcyber_000035
What is Cause Web Server Misclassification (CAPEC-11) attack pattern?
CAPEC
Cause Web Server Misclassification (CAPEC-11): An attack of this type exploits a Web server's decision to take action based on filename or file extension. Because different file types are handled by different server processes, misclassification may force the Web server to take unexpected action, or expected actions in an unexpected sequence. This may cause the server to exhaust resources, supply debug or system data to the attacker, or bind an attacker to a remote process.
web_security
en
intermediate
capec
kwcyber_000036
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Cause Web Server Misclassification (CAPEC-11)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Cause Web Server Misclassification (CAPEC-11): An attack of this type exploits a Web server's decision to take action based on filename or file extension. Because different file types are handled by different server processes, misclassification may force the Web server to take unexpected action, or expected actions in an unexpected sequence. This may cause the server to exhaust resources, supply debug or system data to the attacker, or bind an attacker to a remote process.
web_security
ar
intermediate
capec
kwcyber_000037
How does Cause Web Server Misclassification attack work?
Attack Analysis
Technical analysis of Cause Web Server Misclassification (CAPEC-11): An attack of this type exploits a Web server's decision to take action based on filename or file extension. Because different file types are handled by different server processes, misclassification may force the Web server to take unexpected action, or expected actions in an unexpected sequence. This may cause the server to exhaust resources, supply debug or system data to the attacker, or bind an attacker to a remote process.
web_security
en
advanced
capec
kwcyber_000038
What is SQL Injection through SOAP Parameter Tampering (CAPEC-110) attack pattern?
CAPEC
SQL Injection through SOAP Parameter Tampering (CAPEC-110): An attacker modifies the parameters of the SOAP message that is sent from the service consumer to the service provider to initiate a SQL injection attack. On the service provider side, the SOAP message is parsed and parameters are not properly validated before being used to access a database in a way that does not use parameter binding, thus enabling the attacker to control the structure of the executed SQL query. This pattern describes a SQL injection attack with the delivery mechanism being a SOAP message.
web_security
en
intermediate
capec
kwcyber_000039
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… SQL Injection through SOAP Parameter Tampering (CAPEC-110)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… SQL Injection through SOAP Parameter Tampering (CAPEC-110): An attacker modifies the parameters of the SOAP message that is sent from the service consumer to the service provider to initiate a SQL injection attack. On the service provider side, the SOAP message is parsed and parameters are not properly validated before being used to access a database in a way that does not use parameter binding, thus enabling the attacker to control the structure of the executed SQL query. This pattern describes a SQL injection attack with the delivery mechanism being a SOAP message.
web_security
ar
intermediate
capec
kwcyber_000040
How does SQL Injection through SOAP Parameter Tampering attack work?
Attack Analysis
Technical analysis of SQL Injection through SOAP Parameter Tampering (CAPEC-110): An attacker modifies the parameters of the SOAP message that is sent from the service consumer to the service provider to initiate a SQL injection attack. On the service provider side, the SOAP message is parsed and parameters are not properly validated before being used to access a database in a way that does not use parameter binding, thus enabling the attacker to control the structure of the executed SQL query. This pattern describes a SQL injection attack with the delivery mechanism being a SOAP message.
web_security
en
advanced
capec
kwcyber_000041
What is JSON Hijacking (aka JavaScript Hijacking) (CAPEC-111) attack pattern?
CAPEC
JSON Hijacking (aka JavaScript Hijacking) (CAPEC-111): An attacker targets a system that uses JavaScript Object Notation (JSON) as a transport mechanism between the client and the server (common in Web 2.0 systems using AJAX) to steal possibly confidential information transmitted from the server back to the client inside the JSON object by taking advantage of the loophole in the browser's Same Origin Policy that does not prohibit JavaScript from one website to be included and executed in the context of another website.
web_security
en
intermediate
capec
kwcyber_000042
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… JSON Hijacking (aka JavaScript Hijacking) (CAPEC-111)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… JSON Hijacking (aka JavaScript Hijacking) (CAPEC-111): An attacker targets a system that uses JavaScript Object Notation (JSON) as a transport mechanism between the client and the server (common in Web 2.0 systems using AJAX) to steal possibly confidential information transmitted from the server back to the client inside the JSON object by taking advantage of the loophole in the browser's Same Origin Policy that does not prohibit JavaScript from one website to be included and executed in the context of another website.
web_security
ar
intermediate
capec
kwcyber_000043
How does JSON Hijacking (aka JavaScript Hijacking) attack work?
Attack Analysis
Technical analysis of JSON Hijacking (aka JavaScript Hijacking) (CAPEC-111): An attacker targets a system that uses JavaScript Object Notation (JSON) as a transport mechanism between the client and the server (common in Web 2.0 systems using AJAX) to steal possibly confidential information transmitted from the server back to the client inside the JSON object by taking advantage of the loophole in the browser's Same Origin Policy that does not prohibit JavaScript from one website to be included and executed in the context of another website.
web_security
en
advanced
capec
kwcyber_000044
What is Brute Force (CAPEC-112) attack pattern?
CAPEC
Brute Force (CAPEC-112): In this attack, some asset (information, functionality, identity, etc.) is protected by a finite secret value. The attacker attempts to gain access to this asset by using trial-and-error to exhaustively explore all the possible secret values in the hope of finding the secret (or a value that is functionally equivalent) that will unlock the asset.
web_security
en
intermediate
capec
kwcyber_000045
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Brute Force (CAPEC-112)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Brute Force (CAPEC-112): In this attack, some asset (information, functionality, identity, etc.) is protected by a finite secret value. The attacker attempts to gain access to this asset by using trial-and-error to exhaustively explore all the possible secret values in the hope of finding the secret (or a value that is functionally equivalent) that will unlock the asset.
web_security
ar
intermediate
capec
kwcyber_000046
How does Brute Force attack work?
Attack Analysis
Technical analysis of Brute Force (CAPEC-112): In this attack, some asset (information, functionality, identity, etc.) is protected by a finite secret value. The attacker attempts to gain access to this asset by using trial-and-error to exhaustively explore all the possible secret values in the hope of finding the secret (or a value that is functionally equivalent) that will unlock the asset.
web_security
en
advanced
capec
kwcyber_000047
What is Interface Manipulation (CAPEC-113) attack pattern?
CAPEC
Interface Manipulation (CAPEC-113): An adversary manipulates the use or processing of an interface (e.g. Application Programming Interface (API) or System-on-Chip (SoC)) resulting in an adverse impact upon the security of the system implementing the interface. This can allow the adversary to bypass access control and/or execute functionality not intended by the interface implementation, possibly compromising the system which integrates the interface. Interface manipulation can take on a number of forms including forcing the unexpected use of an interface or the use of an interface in an unintended way.
web_security
en
intermediate
capec
kwcyber_000048
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Interface Manipulation (CAPEC-113)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Interface Manipulation (CAPEC-113): An adversary manipulates the use or processing of an interface (e.g. Application Programming Interface (API) or System-on-Chip (SoC)) resulting in an adverse impact upon the security of the system implementing the interface. This can allow the adversary to bypass access control and/or execute functionality not intended by the interface implementation, possibly compromising the system which integrates the interface. Interface manipulation can take on a number of forms including forcing the unexpected use of an interface or the use of an interface in an unintended way.
web_security
ar
intermediate
capec
kwcyber_000049
How does Interface Manipulation attack work?
Attack Analysis
Technical analysis of Interface Manipulation (CAPEC-113): An adversary manipulates the use or processing of an interface (e.g. Application Programming Interface (API) or System-on-Chip (SoC)) resulting in an adverse impact upon the security of the system implementing the interface. This can allow the adversary to bypass access control and/or execute functionality not intended by the interface implementation, possibly compromising the system which integrates the interface. Interface manipulation can take on a number of forms including forcing the unexpected use of an interface or the use of an interface in an unintended way.
web_security
en
advanced
capec
kwcyber_000050
What is Authentication Abuse (CAPEC-114) attack pattern?
CAPEC
Authentication Abuse (CAPEC-114): An attacker obtains unauthorized access to an application, service or device either through knowledge of the inherent weaknesses of an authentication mechanism, or by exploiting a flaw in the authentication scheme's implementation. In such an attack an authentication mechanism is functioning but a carefully controlled sequence of events causes the mechanism to grant access to the attacker.
web_security
en
intermediate
capec
kwcyber_000051
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Authentication Abuse (CAPEC-114)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Authentication Abuse (CAPEC-114): An attacker obtains unauthorized access to an application, service or device either through knowledge of the inherent weaknesses of an authentication mechanism, or by exploiting a flaw in the authentication scheme's implementation. In such an attack an authentication mechanism is functioning but a carefully controlled sequence of events causes the mechanism to grant access to the attacker.
web_security
ar
intermediate
capec
kwcyber_000052
How does Authentication Abuse attack work?
Attack Analysis
Technical analysis of Authentication Abuse (CAPEC-114): An attacker obtains unauthorized access to an application, service or device either through knowledge of the inherent weaknesses of an authentication mechanism, or by exploiting a flaw in the authentication scheme's implementation. In such an attack an authentication mechanism is functioning but a carefully controlled sequence of events causes the mechanism to grant access to the attacker.
web_security
en
advanced
capec
kwcyber_000053
What is Authentication Bypass (CAPEC-115) attack pattern?
CAPEC
Authentication Bypass (CAPEC-115): An attacker gains access to application, service, or device with the privileges of an authorized or privileged user by evading or circumventing an authentication mechanism. The attacker is therefore able to access protected data without authentication ever having taken place.
web_security
en
intermediate
capec
kwcyber_000054
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Authentication Bypass (CAPEC-115)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Authentication Bypass (CAPEC-115): An attacker gains access to application, service, or device with the privileges of an authorized or privileged user by evading or circumventing an authentication mechanism. The attacker is therefore able to access protected data without authentication ever having taken place.
web_security
ar
intermediate
capec
kwcyber_000055
How does Authentication Bypass attack work?
Attack Analysis
Technical analysis of Authentication Bypass (CAPEC-115): An attacker gains access to application, service, or device with the privileges of an authorized or privileged user by evading or circumventing an authentication mechanism. The attacker is therefore able to access protected data without authentication ever having taken place.
web_security
en
advanced
capec
kwcyber_000056
What is Excavation (CAPEC-116) attack pattern?
CAPEC
Excavation (CAPEC-116): An adversary actively probes the target in a manner that is designed to solicit information that could be leveraged for malicious purposes.
web_security
en
intermediate
capec
kwcyber_000057
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Excavation (CAPEC-116)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Excavation (CAPEC-116): An adversary actively probes the target in a manner that is designed to solicit information that could be leveraged for malicious purposes.
web_security
ar
intermediate
capec
kwcyber_000058
How does Excavation attack work?
Attack Analysis
Technical analysis of Excavation (CAPEC-116): An adversary actively probes the target in a manner that is designed to solicit information that could be leveraged for malicious purposes.
web_security
en
advanced
capec
kwcyber_000059
What is Interception (CAPEC-117) attack pattern?
CAPEC
Interception (CAPEC-117): An adversary monitors data streams to or from the target for information gathering purposes. This attack may be undertaken to solely gather sensitive information or to support a further attack against the target. This attack pattern can involve sniffing network traffic as well as other types of data streams (e.g. radio). The adversary can attempt to initiate the establishment of a data stream or passively observe the communications as they unfold. In all variants of this attack, the adversary is not the intended recipient of the data stream. In contrast to other means of gathering information
web_security
en
intermediate
capec
kwcyber_000060
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Interception (CAPEC-117)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Interception (CAPEC-117): An adversary monitors data streams to or from the target for information gathering purposes. This attack may be undertaken to solely gather sensitive information or to support a further attack against the target. This attack pattern can involve sniffing network traffic as well as other types of data streams (e.g. radio). The adversary can attempt to initiate the establishment of a data stream or passively observe the communications as they unfold. In all variants of this attack, the adversary is not the intended recipient of the data stream. In contrast to other means of gathering information
web_security
ar
intermediate
capec
kwcyber_000061
How does Interception attack work?
Attack Analysis
Technical analysis of Interception (CAPEC-117): An adversary monitors data streams to or from the target for information gathering purposes. This attack may be undertaken to solely gather sensitive information or to support a further attack against the target. This attack pattern can involve sniffing network traffic as well as other types of data streams (e.g. radio). The adversary can attempt to initiate the establishment of a data stream or passively observe the communications as they unfold. In all variants of this attack, the adversary is not the intended recipient of the data stream. In contrast to other means of gathering information
web_security
en
advanced
capec
kwcyber_000062
What is Choosing Message Identifier (CAPEC-12) attack pattern?
CAPEC
Choosing Message Identifier (CAPEC-12): This pattern of attack is defined by the selection of messages distributed via multicast or public information channels that are intended for another client by determining the parameter value assigned to that client. This attack allows the adversary to gain access to potentially privileged information, and to possibly perpetrate other attacks through the distribution means by impersonation. If the channel/message being manipulated is an input rather than output mechanism for the system, (such as a command bus), this style of attack could be used to change the adversary's identifier to more a p
web_security
en
intermediate
capec
kwcyber_000063
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Choosing Message Identifier (CAPEC-12)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Choosing Message Identifier (CAPEC-12): This pattern of attack is defined by the selection of messages distributed via multicast or public information channels that are intended for another client by determining the parameter value assigned to that client. This attack allows the adversary to gain access to potentially privileged information, and to possibly perpetrate other attacks through the distribution means by impersonation. If the channel/message being manipulated is an input rather than output mechanism for the system, (such as a command bus), this style of attack could be used to change the adversary's identifier to more a p
web_security
ar
intermediate
capec
kwcyber_000064
How does Choosing Message Identifier attack work?
Attack Analysis
Technical analysis of Choosing Message Identifier (CAPEC-12): This pattern of attack is defined by the selection of messages distributed via multicast or public information channels that are intended for another client by determining the parameter value assigned to that client. This attack allows the adversary to gain access to potentially privileged information, and to possibly perpetrate other attacks through the distribution means by impersonation. If the channel/message being manipulated is an input rather than output mechanism for the system, (such as a command bus), this style of attack could be used to change the adversary's identifier to more a p
web_security
en
advanced
capec
kwcyber_000065
What is Double Encoding (CAPEC-120) attack pattern?
CAPEC
Double Encoding (CAPEC-120): The adversary utilizes a repeating of the encoding process for a set of characters (that is, character encoding a character encoding of a character) to obfuscate the payload of a particular request. This may allow the adversary to bypass filters that attempt to detect illegal characters or strings, such as those that might be used in traversal or injection attacks. Filters may be able to catch illegal encoded strings, but may not catch doubly encoded strings. For example, a dot (.), often used in path traversal attacks and therefore often blocked by filters, could be URL encoded as %2E. Howeve
web_security
en
intermediate
capec
kwcyber_000066
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Double Encoding (CAPEC-120)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Double Encoding (CAPEC-120): The adversary utilizes a repeating of the encoding process for a set of characters (that is, character encoding a character encoding of a character) to obfuscate the payload of a particular request. This may allow the adversary to bypass filters that attempt to detect illegal characters or strings, such as those that might be used in traversal or injection attacks. Filters may be able to catch illegal encoded strings, but may not catch doubly encoded strings. For example, a dot (.), often used in path traversal attacks and therefore often blocked by filters, could be URL encoded as %2E. Howeve
web_security
ar
intermediate
capec
kwcyber_000067
How does Double Encoding attack work?
Attack Analysis
Technical analysis of Double Encoding (CAPEC-120): The adversary utilizes a repeating of the encoding process for a set of characters (that is, character encoding a character encoding of a character) to obfuscate the payload of a particular request. This may allow the adversary to bypass filters that attempt to detect illegal characters or strings, such as those that might be used in traversal or injection attacks. Filters may be able to catch illegal encoded strings, but may not catch doubly encoded strings. For example, a dot (.), often used in path traversal attacks and therefore often blocked by filters, could be URL encoded as %2E. Howeve
web_security
en
advanced
capec
kwcyber_000068
What is Exploit Non-Production Interfaces (CAPEC-121) attack pattern?
CAPEC
Exploit Non-Production Interfaces (CAPEC-121): <xhtml:p>An adversary exploits a sample, demonstration, test, or debug interface that is unintentionally enabled on a production system, with the goal of gleaning information or leveraging functionality that would otherwise be unavailable.</xhtml:p>
web_security
en
intermediate
capec
kwcyber_000069
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Exploit Non-Production Interfaces (CAPEC-121)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Exploit Non-Production Interfaces (CAPEC-121): <xhtml:p>An adversary exploits a sample, demonstration, test, or debug interface that is unintentionally enabled on a production system, with the goal of gleaning information or leveraging functionality that would otherwise be unavailable.</xhtml:p>
web_security
ar
intermediate
capec
kwcyber_000070
How does Exploit Non-Production Interfaces attack work?
Attack Analysis
Technical analysis of Exploit Non-Production Interfaces (CAPEC-121): <xhtml:p>An adversary exploits a sample, demonstration, test, or debug interface that is unintentionally enabled on a production system, with the goal of gleaning information or leveraging functionality that would otherwise be unavailable.</xhtml:p>
web_security
en
advanced
capec
kwcyber_000071
What is Privilege Abuse (CAPEC-122) attack pattern?
CAPEC
Privilege Abuse (CAPEC-122): An adversary is able to exploit features of the target that should be reserved for privileged users or administrators but are exposed to use by lower or non-privileged accounts. Access to sensitive information and functionality must be controlled to ensure that only authorized users are able to access these resources.
web_security
en
intermediate
capec
kwcyber_000072
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Privilege Abuse (CAPEC-122)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Privilege Abuse (CAPEC-122): An adversary is able to exploit features of the target that should be reserved for privileged users or administrators but are exposed to use by lower or non-privileged accounts. Access to sensitive information and functionality must be controlled to ensure that only authorized users are able to access these resources.
web_security
ar
intermediate
capec
kwcyber_000073
How does Privilege Abuse attack work?
Attack Analysis
Technical analysis of Privilege Abuse (CAPEC-122): An adversary is able to exploit features of the target that should be reserved for privileged users or administrators but are exposed to use by lower or non-privileged accounts. Access to sensitive information and functionality must be controlled to ensure that only authorized users are able to access these resources.
web_security
en
advanced
capec
kwcyber_000074
What is Buffer Manipulation (CAPEC-123) attack pattern?
CAPEC
Buffer Manipulation (CAPEC-123): An adversary manipulates an application's interaction with a buffer in an attempt to read or modify data they shouldn't have access to. Buffer attacks are distinguished in that it is the buffer space itself that is the target of the attack rather than any code responsible for interpreting the content of the buffer. In virtually all buffer attacks the content that is placed in the buffer is immaterial. Instead, most buffer attacks involve retrieving or providing more input than can be stored in the allocated buffer, resulting in the reading or overwriting of other unintended program memory.
web_security
en
intermediate
capec
kwcyber_000075
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Buffer Manipulation (CAPEC-123)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Buffer Manipulation (CAPEC-123): An adversary manipulates an application's interaction with a buffer in an attempt to read or modify data they shouldn't have access to. Buffer attacks are distinguished in that it is the buffer space itself that is the target of the attack rather than any code responsible for interpreting the content of the buffer. In virtually all buffer attacks the content that is placed in the buffer is immaterial. Instead, most buffer attacks involve retrieving or providing more input than can be stored in the allocated buffer, resulting in the reading or overwriting of other unintended program memory.
web_security
ar
intermediate
capec
kwcyber_000076
How does Buffer Manipulation attack work?
Attack Analysis
Technical analysis of Buffer Manipulation (CAPEC-123): An adversary manipulates an application's interaction with a buffer in an attempt to read or modify data they shouldn't have access to. Buffer attacks are distinguished in that it is the buffer space itself that is the target of the attack rather than any code responsible for interpreting the content of the buffer. In virtually all buffer attacks the content that is placed in the buffer is immaterial. Instead, most buffer attacks involve retrieving or providing more input than can be stored in the allocated buffer, resulting in the reading or overwriting of other unintended program memory.
web_security
en
advanced
capec
kwcyber_000077
What is Shared Resource Manipulation (CAPEC-124) attack pattern?
CAPEC
Shared Resource Manipulation (CAPEC-124): An adversary exploits a resource shared between multiple applications, an application pool or hardware pin multiplexing to affect behavior. Resources may be shared between multiple applications or between multiple threads of a single application. Resource sharing is usually accomplished through mutual access to a single memory location or multiplexed hardware pins. If an adversary can manipulate this shared resource (usually by co-opting one of the applications or threads) the other applications or threads using the shared resource will often continue to trust the validity of the compromised s
web_security
en
intermediate
capec
kwcyber_000078
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Shared Resource Manipulation (CAPEC-124)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Shared Resource Manipulation (CAPEC-124): An adversary exploits a resource shared between multiple applications, an application pool or hardware pin multiplexing to affect behavior. Resources may be shared between multiple applications or between multiple threads of a single application. Resource sharing is usually accomplished through mutual access to a single memory location or multiplexed hardware pins. If an adversary can manipulate this shared resource (usually by co-opting one of the applications or threads) the other applications or threads using the shared resource will often continue to trust the validity of the compromised s
web_security
ar
intermediate
capec
kwcyber_000079
How does Shared Resource Manipulation attack work?
Attack Analysis
Technical analysis of Shared Resource Manipulation (CAPEC-124): An adversary exploits a resource shared between multiple applications, an application pool or hardware pin multiplexing to affect behavior. Resources may be shared between multiple applications or between multiple threads of a single application. Resource sharing is usually accomplished through mutual access to a single memory location or multiplexed hardware pins. If an adversary can manipulate this shared resource (usually by co-opting one of the applications or threads) the other applications or threads using the shared resource will often continue to trust the validity of the compromised s
web_security
en
advanced
capec
kwcyber_000080
What is Flooding (CAPEC-125) attack pattern?
CAPEC
Flooding (CAPEC-125): An adversary consumes the resources of a target by rapidly engaging in a large number of interactions with the target. This type of attack generally exposes a weakness in rate limiting or flow. When successful this attack prevents legitimate users from accessing the service and can cause the target to crash. This attack differs from resource depletion through leaks or allocations in that the latter attacks do not rely on the volume of requests made to the target but instead focus on manipulation of the target's operations. The key factor in a flooding attack is the number of requests the adver
web_security
en
intermediate
capec
kwcyber_000081
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Flooding (CAPEC-125)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Flooding (CAPEC-125): An adversary consumes the resources of a target by rapidly engaging in a large number of interactions with the target. This type of attack generally exposes a weakness in rate limiting or flow. When successful this attack prevents legitimate users from accessing the service and can cause the target to crash. This attack differs from resource depletion through leaks or allocations in that the latter attacks do not rely on the volume of requests made to the target but instead focus on manipulation of the target's operations. The key factor in a flooding attack is the number of requests the adver
web_security
ar
intermediate
capec
kwcyber_000082
How does Flooding attack work?
Attack Analysis
Technical analysis of Flooding (CAPEC-125): An adversary consumes the resources of a target by rapidly engaging in a large number of interactions with the target. This type of attack generally exposes a weakness in rate limiting or flow. When successful this attack prevents legitimate users from accessing the service and can cause the target to crash. This attack differs from resource depletion through leaks or allocations in that the latter attacks do not rely on the volume of requests made to the target but instead focus on manipulation of the target's operations. The key factor in a flooding attack is the number of requests the adver
web_security
en
advanced
capec
kwcyber_000083
What is Path Traversal (CAPEC-126) attack pattern?
CAPEC
Path Traversal (CAPEC-126): An adversary uses path manipulation methods to exploit insufficient input validation of a target to obtain access to data that should be not be retrievable by ordinary well-formed requests. A typical variety of this attack involves specifying a path to a desired file together with dot-dot-slash characters, resulting in the file access API or function traversing out of the intended directory structure and into the root file system. By replacing or modifying the expected path information the access function or API retrieves the file desired by the attacker. These attacks either involve the attac
web_security
en
intermediate
capec
kwcyber_000084
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Path Traversal (CAPEC-126)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Path Traversal (CAPEC-126): An adversary uses path manipulation methods to exploit insufficient input validation of a target to obtain access to data that should be not be retrievable by ordinary well-formed requests. A typical variety of this attack involves specifying a path to a desired file together with dot-dot-slash characters, resulting in the file access API or function traversing out of the intended directory structure and into the root file system. By replacing or modifying the expected path information the access function or API retrieves the file desired by the attacker. These attacks either involve the attac
web_security
ar
intermediate
capec
kwcyber_000085
How does Path Traversal attack work?
Attack Analysis
Technical analysis of Path Traversal (CAPEC-126): An adversary uses path manipulation methods to exploit insufficient input validation of a target to obtain access to data that should be not be retrievable by ordinary well-formed requests. A typical variety of this attack involves specifying a path to a desired file together with dot-dot-slash characters, resulting in the file access API or function traversing out of the intended directory structure and into the root file system. By replacing or modifying the expected path information the access function or API retrieves the file desired by the attacker. These attacks either involve the attac
web_security
en
advanced
capec
kwcyber_000086
What is Directory Indexing (CAPEC-127) attack pattern?
CAPEC
Directory Indexing (CAPEC-127): An adversary crafts a request to a target that results in the target listing/indexing the content of a directory as output. One common method of triggering directory contents as output is to construct a request containing a path that terminates in a directory name rather than a file name since many applications are configured to provide a list of the directory's contents when such a request is received. An adversary can use this to explore the directory tree on a target as well as learn the names of files. This can often end up revealing test files, backup files, temporary files, hidden files,
web_security
en
intermediate
capec
kwcyber_000087
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Directory Indexing (CAPEC-127)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Directory Indexing (CAPEC-127): An adversary crafts a request to a target that results in the target listing/indexing the content of a directory as output. One common method of triggering directory contents as output is to construct a request containing a path that terminates in a directory name rather than a file name since many applications are configured to provide a list of the directory's contents when such a request is received. An adversary can use this to explore the directory tree on a target as well as learn the names of files. This can often end up revealing test files, backup files, temporary files, hidden files,
web_security
ar
intermediate
capec
kwcyber_000088
How does Directory Indexing attack work?
Attack Analysis
Technical analysis of Directory Indexing (CAPEC-127): An adversary crafts a request to a target that results in the target listing/indexing the content of a directory as output. One common method of triggering directory contents as output is to construct a request containing a path that terminates in a directory name rather than a file name since many applications are configured to provide a list of the directory's contents when such a request is received. An adversary can use this to explore the directory tree on a target as well as learn the names of files. This can often end up revealing test files, backup files, temporary files, hidden files,
web_security
en
advanced
capec
kwcyber_000089
What is Integer Attacks (CAPEC-128) attack pattern?
CAPEC
Integer Attacks (CAPEC-128): An attacker takes advantage of the structure of integer variables to cause these variables to assume values that are not expected by an application. For example, adding one to the largest positive integer in a signed integer variable results in a negative number. Negative numbers may be illegal in an application and the application may prevent an attacker from providing them directly, but the application may not consider that adding two positive numbers can create a negative number do to the structure of integer storage formats.
web_security
en
intermediate
capec
kwcyber_000090
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Integer Attacks (CAPEC-128)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Integer Attacks (CAPEC-128): An attacker takes advantage of the structure of integer variables to cause these variables to assume values that are not expected by an application. For example, adding one to the largest positive integer in a signed integer variable results in a negative number. Negative numbers may be illegal in an application and the application may prevent an attacker from providing them directly, but the application may not consider that adding two positive numbers can create a negative number do to the structure of integer storage formats.
web_security
ar
intermediate
capec
kwcyber_000091
How does Integer Attacks attack work?
Attack Analysis
Technical analysis of Integer Attacks (CAPEC-128): An attacker takes advantage of the structure of integer variables to cause these variables to assume values that are not expected by an application. For example, adding one to the largest positive integer in a signed integer variable results in a negative number. Negative numbers may be illegal in an application and the application may prevent an attacker from providing them directly, but the application may not consider that adding two positive numbers can create a negative number do to the structure of integer storage formats.
web_security
en
advanced
capec
kwcyber_000092
What is Pointer Manipulation (CAPEC-129) attack pattern?
CAPEC
Pointer Manipulation (CAPEC-129): This attack pattern involves an adversary manipulating a pointer within a target application resulting in the application accessing an unintended memory location. This can result in the crashing of the application or, for certain pointer values, access to data that would not normally be possible or the execution of arbitrary code. Since pointers are simply integer variables, Integer Attacks may often be used in Pointer Attacks.
web_security
en
intermediate
capec
kwcyber_000093
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Pointer Manipulation (CAPEC-129)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Pointer Manipulation (CAPEC-129): This attack pattern involves an adversary manipulating a pointer within a target application resulting in the application accessing an unintended memory location. This can result in the crashing of the application or, for certain pointer values, access to data that would not normally be possible or the execution of arbitrary code. Since pointers are simply integer variables, Integer Attacks may often be used in Pointer Attacks.
web_security
ar
intermediate
capec
kwcyber_000094
How does Pointer Manipulation attack work?
Attack Analysis
Technical analysis of Pointer Manipulation (CAPEC-129): This attack pattern involves an adversary manipulating a pointer within a target application resulting in the application accessing an unintended memory location. This can result in the crashing of the application or, for certain pointer values, access to data that would not normally be possible or the execution of arbitrary code. Since pointers are simply integer variables, Integer Attacks may often be used in Pointer Attacks.
web_security
en
advanced
capec
kwcyber_000095
What is Subverting Environment Variable Values (CAPEC-13) attack pattern?
CAPEC
Subverting Environment Variable Values (CAPEC-13): The adversary directly or indirectly modifies environment variables used by or controlling the target software. The adversary's goal is to cause the target software to deviate from its expected operation in a manner that benefits the adversary.
web_security
en
intermediate
capec
kwcyber_000096
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Subverting Environment Variable Values (CAPEC-13)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Subverting Environment Variable Values (CAPEC-13): The adversary directly or indirectly modifies environment variables used by or controlling the target software. The adversary's goal is to cause the target software to deviate from its expected operation in a manner that benefits the adversary.
web_security
ar
intermediate
capec
kwcyber_000097
How does Subverting Environment Variable Values attack work?
Attack Analysis
Technical analysis of Subverting Environment Variable Values (CAPEC-13): The adversary directly or indirectly modifies environment variables used by or controlling the target software. The adversary's goal is to cause the target software to deviate from its expected operation in a manner that benefits the adversary.
web_security
en
advanced
capec
kwcyber_000098
What is Excessive Allocation (CAPEC-130) attack pattern?
CAPEC
Excessive Allocation (CAPEC-130): An adversary causes the target to allocate excessive resources to servicing the attackers' request, thereby reducing the resources available for legitimate services and degrading or denying services. Usually, this attack focuses on memory allocation, but any finite resource on the target could be the attacked, including bandwidth, processing cycles, or other resources. This attack does not attempt to force this allocation through a large number of requests (that would be Resource Depletion through Flooding) but instead uses one or a small number of requests that are carefully formatted to forc
web_security
en
intermediate
capec
kwcyber_000099