instruction stringlengths 20 156 | context stringclasses 37
values | response stringlengths 73 869 | category stringclasses 11
values | language stringclasses 2
values | difficulty stringclasses 4
values | source stringclasses 8
values | id stringlengths 14 14 |
|---|---|---|---|---|---|---|---|
How does Manipulating Hidden Fields attack work? | Attack Analysis | Technical analysis of Manipulating Hidden Fields (CAPEC-162): An adversary exploits a weakness in the server's trust of client-side processing by modifying data on the client-side, such as price information, and then submitting this data to the server, which processes the modified data. For example, eShoplifting is a d... | web_security | en | advanced | capec | kwcyber_000200 |
What is Spear Phishing (CAPEC-163) attack pattern? | CAPEC | Spear Phishing (CAPEC-163): An adversary targets a specific user or group with a Phishing (CAPEC-98) attack tailored to a category of users in order to have maximum relevance and deceptive capability. Spear Phishing is an enhanced version of the Phishing attack targeted to a specific user or group. The quality of the t... | web_security | en | intermediate | capec | kwcyber_000201 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Spear Phishing (CAPEC-163)ุ | CAPEC | ูู
ุท ุงููุฌูู
Spear Phishing (CAPEC-163): An adversary targets a specific user or group with a Phishing (CAPEC-98) attack tailored to a category of users in order to have maximum relevance and deceptive capability. Spear Phishing is an enhanced version of the Phishing attack targeted to a specific user or group. The quali... | web_security | ar | intermediate | capec | kwcyber_000202 |
How does Spear Phishing attack work? | Attack Analysis | Technical analysis of Spear Phishing (CAPEC-163): An adversary targets a specific user or group with a Phishing (CAPEC-98) attack tailored to a category of users in order to have maximum relevance and deceptive capability. Spear Phishing is an enhanced version of the Phishing attack targeted to a specific user or group... | web_security | en | advanced | capec | kwcyber_000203 |
What is Mobile Phishing (CAPEC-164) attack pattern? | CAPEC | Mobile Phishing (CAPEC-164): An adversary targets mobile phone users with a phishing attack for the purpose of soliciting account passwords or sensitive information from the user. Mobile Phishing is a variation of the Phishing social engineering technique where the attack is initiated via a text or SMS message, rather ... | web_security | en | intermediate | capec | kwcyber_000204 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Mobile Phishing (CAPEC-164)ุ | CAPEC | ูู
ุท ุงููุฌูู
Mobile Phishing (CAPEC-164): An adversary targets mobile phone users with a phishing attack for the purpose of soliciting account passwords or sensitive information from the user. Mobile Phishing is a variation of the Phishing social engineering technique where the attack is initiated via a text or SMS messa... | web_security | ar | intermediate | capec | kwcyber_000205 |
How does Mobile Phishing attack work? | Attack Analysis | Technical analysis of Mobile Phishing (CAPEC-164): An adversary targets mobile phone users with a phishing attack for the purpose of soliciting account passwords or sensitive information from the user. Mobile Phishing is a variation of the Phishing social engineering technique where the attack is initiated via a text o... | web_security | en | advanced | capec | kwcyber_000206 |
What is File Manipulation (CAPEC-165) attack pattern? | CAPEC | File Manipulation (CAPEC-165): An attacker modifies file contents or attributes (such as extensions or names) of files in a manner to cause incorrect processing by an application. Attackers use this class of attacks to cause applications to enter unstable states, overwrite or expose sensitive information, and even exec... | web_security | en | intermediate | capec | kwcyber_000207 |
ู
ุง ูู ูู
ุท ุงููุฌูู
File Manipulation (CAPEC-165)ุ | CAPEC | ูู
ุท ุงููุฌูู
File Manipulation (CAPEC-165): An attacker modifies file contents or attributes (such as extensions or names) of files in a manner to cause incorrect processing by an application. Attackers use this class of attacks to cause applications to enter unstable states, overwrite or expose sensitive information, an... | web_security | ar | intermediate | capec | kwcyber_000208 |
How does File Manipulation attack work? | Attack Analysis | Technical analysis of File Manipulation (CAPEC-165): An attacker modifies file contents or attributes (such as extensions or names) of files in a manner to cause incorrect processing by an application. Attackers use this class of attacks to cause applications to enter unstable states, overwrite or expose sensitive info... | web_security | en | advanced | capec | kwcyber_000209 |
What is Force the System to Reset Values (CAPEC-166) attack pattern? | CAPEC | Force the System to Reset Values (CAPEC-166): An attacker forces the target into a previous state in order to leverage potential weaknesses in the target dependent upon a prior configuration or state-dependent factors. Even in cases where an attacker may not be able to directly control the configuration of the targeted... | web_security | en | intermediate | capec | kwcyber_000210 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Force the System to Reset Values (CAPEC-166)ุ | CAPEC | ูู
ุท ุงููุฌูู
Force the System to Reset Values (CAPEC-166): An attacker forces the target into a previous state in order to leverage potential weaknesses in the target dependent upon a prior configuration or state-dependent factors. Even in cases where an attacker may not be able to directly control the configuration of t... | web_security | ar | intermediate | capec | kwcyber_000211 |
How does Force the System to Reset Values attack work? | Attack Analysis | Technical analysis of Force the System to Reset Values (CAPEC-166): An attacker forces the target into a previous state in order to leverage potential weaknesses in the target dependent upon a prior configuration or state-dependent factors. Even in cases where an attacker may not be able to directly control the configu... | web_security | en | advanced | capec | kwcyber_000212 |
What is White Box Reverse Engineering (CAPEC-167) attack pattern? | CAPEC | White Box Reverse Engineering (CAPEC-167): An attacker discovers the structure, function, and composition of a type of computer software through white box analysis techniques. White box techniques involve methods which can be applied to a piece of software when an executable or some other compiled object can be directl... | web_security | en | intermediate | capec | kwcyber_000213 |
ู
ุง ูู ูู
ุท ุงููุฌูู
White Box Reverse Engineering (CAPEC-167)ุ | CAPEC | ูู
ุท ุงููุฌูู
White Box Reverse Engineering (CAPEC-167): An attacker discovers the structure, function, and composition of a type of computer software through white box analysis techniques. White box techniques involve methods which can be applied to a piece of software when an executable or some other compiled object can... | web_security | ar | intermediate | capec | kwcyber_000214 |
How does White Box Reverse Engineering attack work? | Attack Analysis | Technical analysis of White Box Reverse Engineering (CAPEC-167): An attacker discovers the structure, function, and composition of a type of computer software through white box analysis techniques. White box techniques involve methods which can be applied to a piece of software when an executable or some other compiled... | web_security | en | advanced | capec | kwcyber_000215 |
What is Windows ::DATA Alternate Data Stream (CAPEC-168) attack pattern? | CAPEC | Windows ::DATA Alternate Data Stream (CAPEC-168): An attacker exploits the functionality of Microsoft NTFS Alternate Data Streams (ADS) to undermine system security. ADS allows multiple "files" to be stored in one directory entry referenced as filename:streamname. One or more alternate data streams may be stored in any... | web_security | en | intermediate | capec | kwcyber_000216 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Windows ::DATA Alternate Data Stream (CAPEC-168)ุ | CAPEC | ูู
ุท ุงููุฌูู
Windows ::DATA Alternate Data Stream (CAPEC-168): An attacker exploits the functionality of Microsoft NTFS Alternate Data Streams (ADS) to undermine system security. ADS allows multiple "files" to be stored in one directory entry referenced as filename:streamname. One or more alternate data streams may be st... | web_security | ar | intermediate | capec | kwcyber_000217 |
How does Windows ::DATA Alternate Data Stream attack work? | Attack Analysis | Technical analysis of Windows ::DATA Alternate Data Stream (CAPEC-168): An attacker exploits the functionality of Microsoft NTFS Alternate Data Streams (ADS) to undermine system security. ADS allows multiple "files" to be stored in one directory entry referenced as filename:streamname. One or more alternate data stream... | web_security | en | advanced | capec | kwcyber_000218 |
What is Footprinting (CAPEC-169) attack pattern? | CAPEC | Footprinting (CAPEC-169): An adversary engages in probing and exploration activities to identify constituents and properties of the target. | web_security | en | intermediate | capec | kwcyber_000219 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Footprinting (CAPEC-169)ุ | CAPEC | ูู
ุท ุงููุฌูู
Footprinting (CAPEC-169): An adversary engages in probing and exploration activities to identify constituents and properties of the target. | web_security | ar | intermediate | capec | kwcyber_000220 |
How does Footprinting attack work? | Attack Analysis | Technical analysis of Footprinting (CAPEC-169): An adversary engages in probing and exploration activities to identify constituents and properties of the target. | web_security | en | advanced | capec | kwcyber_000221 |
What is Using Malicious Files (CAPEC-17) attack pattern? | CAPEC | Using Malicious Files (CAPEC-17): An attack of this type exploits a system's configuration that allows an adversary to either directly access an executable file, for example through shell access; or in a possible worst case allows an adversary to upload a file and then execute it. Web servers, ftp servers, and message ... | web_security | en | intermediate | capec | kwcyber_000222 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Using Malicious Files (CAPEC-17)ุ | CAPEC | ูู
ุท ุงููุฌูู
Using Malicious Files (CAPEC-17): An attack of this type exploits a system's configuration that allows an adversary to either directly access an executable file, for example through shell access; or in a possible worst case allows an adversary to upload a file and then execute it. Web servers, ftp servers, a... | web_security | ar | intermediate | capec | kwcyber_000223 |
How does Using Malicious Files attack work? | Attack Analysis | Technical analysis of Using Malicious Files (CAPEC-17): An attack of this type exploits a system's configuration that allows an adversary to either directly access an executable file, for example through shell access; or in a possible worst case allows an adversary to upload a file and then execute it. Web servers, ftp... | web_security | en | advanced | capec | kwcyber_000224 |
What is Web Application Fingerprinting (CAPEC-170) attack pattern? | CAPEC | Web Application Fingerprinting (CAPEC-170): An attacker sends a series of probes to a web application in order to elicit version-dependent and type-dependent behavior that assists in identifying the target. An attacker could learn information such as software versions, error pages, and response headers, variations in i... | web_security | en | intermediate | capec | kwcyber_000225 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Web Application Fingerprinting (CAPEC-170)ุ | CAPEC | ูู
ุท ุงููุฌูู
Web Application Fingerprinting (CAPEC-170): An attacker sends a series of probes to a web application in order to elicit version-dependent and type-dependent behavior that assists in identifying the target. An attacker could learn information such as software versions, error pages, and response headers, vari... | web_security | ar | intermediate | capec | kwcyber_000226 |
How does Web Application Fingerprinting attack work? | Attack Analysis | Technical analysis of Web Application Fingerprinting (CAPEC-170): An attacker sends a series of probes to a web application in order to elicit version-dependent and type-dependent behavior that assists in identifying the target. An attacker could learn information such as software versions, error pages, and response he... | web_security | en | advanced | capec | kwcyber_000227 |
What is DEPRECATED: Variable Manipulation (CAPEC-171) attack pattern? | CAPEC | DEPRECATED: Variable Manipulation (CAPEC-171): This attack pattern has been deprecated as it is a duplicate of the existing attack pattern "CAPEC-77 : Manipulating User-Controlled Variables". Please refer to this other CAPEC going forward. | web_security | en | intermediate | capec | kwcyber_000228 |
ู
ุง ูู ูู
ุท ุงููุฌูู
DEPRECATED: Variable Manipulation (CAPEC-171)ุ | CAPEC | ูู
ุท ุงููุฌูู
DEPRECATED: Variable Manipulation (CAPEC-171): This attack pattern has been deprecated as it is a duplicate of the existing attack pattern "CAPEC-77 : Manipulating User-Controlled Variables". Please refer to this other CAPEC going forward. | web_security | ar | intermediate | capec | kwcyber_000229 |
How does DEPRECATED: Variable Manipulation attack work? | Attack Analysis | Technical analysis of DEPRECATED: Variable Manipulation (CAPEC-171): This attack pattern has been deprecated as it is a duplicate of the existing attack pattern "CAPEC-77 : Manipulating User-Controlled Variables". Please refer to this other CAPEC going forward. | web_security | en | advanced | capec | kwcyber_000230 |
What is Action Spoofing (CAPEC-173) attack pattern? | CAPEC | Action Spoofing (CAPEC-173): An adversary is able to disguise one action for another and therefore trick a user into initiating one type of action when they intend to initiate a different action. For example, a user might be led to believe that clicking a button will submit a query, but in fact it downloads software. A... | web_security | en | intermediate | capec | kwcyber_000231 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Action Spoofing (CAPEC-173)ุ | CAPEC | ูู
ุท ุงููุฌูู
Action Spoofing (CAPEC-173): An adversary is able to disguise one action for another and therefore trick a user into initiating one type of action when they intend to initiate a different action. For example, a user might be led to believe that clicking a button will submit a query, but in fact it downloads ... | web_security | ar | intermediate | capec | kwcyber_000232 |
How does Action Spoofing attack work? | Attack Analysis | Technical analysis of Action Spoofing (CAPEC-173): An adversary is able to disguise one action for another and therefore trick a user into initiating one type of action when they intend to initiate a different action. For example, a user might be led to believe that clicking a button will submit a query, but in fact it... | web_security | en | advanced | capec | kwcyber_000233 |
What is Flash Parameter Injection (CAPEC-174) attack pattern? | CAPEC | Flash Parameter Injection (CAPEC-174): An adversary takes advantage of improper data validation to inject malicious global parameters into a Flash file embedded within an HTML document. Flash files can leverage user-submitted data to configure the Flash document and access the embedding HTML document. | web_security | en | intermediate | capec | kwcyber_000234 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Flash Parameter Injection (CAPEC-174)ุ | CAPEC | ูู
ุท ุงููุฌูู
Flash Parameter Injection (CAPEC-174): An adversary takes advantage of improper data validation to inject malicious global parameters into a Flash file embedded within an HTML document. Flash files can leverage user-submitted data to configure the Flash document and access the embedding HTML document. | web_security | ar | intermediate | capec | kwcyber_000235 |
How does Flash Parameter Injection attack work? | Attack Analysis | Technical analysis of Flash Parameter Injection (CAPEC-174): An adversary takes advantage of improper data validation to inject malicious global parameters into a Flash file embedded within an HTML document. Flash files can leverage user-submitted data to configure the Flash document and access the embedding HTML docum... | web_security | en | advanced | capec | kwcyber_000236 |
What is Code Inclusion (CAPEC-175) attack pattern? | CAPEC | Code Inclusion (CAPEC-175): An adversary exploits a weakness on the target to force arbitrary code to be retrieved locally or from a remote location and executed. This differs from code injection in that code injection involves the direct inclusion of code while code inclusion involves the addition or replacement of a ... | web_security | en | intermediate | capec | kwcyber_000237 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Code Inclusion (CAPEC-175)ุ | CAPEC | ูู
ุท ุงููุฌูู
Code Inclusion (CAPEC-175): An adversary exploits a weakness on the target to force arbitrary code to be retrieved locally or from a remote location and executed. This differs from code injection in that code injection involves the direct inclusion of code while code inclusion involves the addition or replac... | web_security | ar | intermediate | capec | kwcyber_000238 |
How does Code Inclusion attack work? | Attack Analysis | Technical analysis of Code Inclusion (CAPEC-175): An adversary exploits a weakness on the target to force arbitrary code to be retrieved locally or from a remote location and executed. This differs from code injection in that code injection involves the direct inclusion of code while code inclusion involves the additio... | web_security | en | advanced | capec | kwcyber_000239 |
What is Configuration/Environment Manipulation (CAPEC-176) attack pattern? | CAPEC | Configuration/Environment Manipulation (CAPEC-176): An attacker manipulates files or settings external to a target application which affect the behavior of that application. For example, many applications use external configuration files and libraries - modification of these entities or otherwise affecting the applicat... | web_security | en | intermediate | capec | kwcyber_000240 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Configuration/Environment Manipulation (CAPEC-176)ุ | CAPEC | ูู
ุท ุงููุฌูู
Configuration/Environment Manipulation (CAPEC-176): An attacker manipulates files or settings external to a target application which affect the behavior of that application. For example, many applications use external configuration files and libraries - modification of these entities or otherwise affecting t... | web_security | ar | intermediate | capec | kwcyber_000241 |
How does Configuration/Environment Manipulation attack work? | Attack Analysis | Technical analysis of Configuration/Environment Manipulation (CAPEC-176): An attacker manipulates files or settings external to a target application which affect the behavior of that application. For example, many applications use external configuration files and libraries - modification of these entities or otherwise ... | web_security | en | advanced | capec | kwcyber_000242 |
What is Create files with the same name as files protected with a higher classification (CAPEC-177) attack pattern? | CAPEC | Create files with the same name as files protected with a higher classification (CAPEC-177): An attacker exploits file location algorithms in an operating system or application by creating a file with the same name as a protected or privileged file. The attacker could manipulate the system if the attacker-created file ... | web_security | en | intermediate | capec | kwcyber_000243 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Create files with the same name as files protected with a higher classification (CAPEC-177)ุ | CAPEC | ูู
ุท ุงููุฌูู
Create files with the same name as files protected with a higher classification (CAPEC-177): An attacker exploits file location algorithms in an operating system or application by creating a file with the same name as a protected or privileged file. The attacker could manipulate the system if the attacker-cr... | web_security | ar | intermediate | capec | kwcyber_000244 |
How does Create files with the same name as files protected with a higher classification attack work? | Attack Analysis | Technical analysis of Create files with the same name as files protected with a higher classification (CAPEC-177): An attacker exploits file location algorithms in an operating system or application by creating a file with the same name as a protected or privileged file. The attacker could manipulate the system if the ... | web_security | en | advanced | capec | kwcyber_000245 |
What is Cross-Site Flashing (CAPEC-178) attack pattern? | CAPEC | Cross-Site Flashing (CAPEC-178): An attacker is able to trick the victim into executing a Flash document that passes commands or calls to a Flash player browser plugin, allowing the attacker to exploit native Flash functionality in the client browser. This attack pattern occurs where an attacker can provide a crafted l... | web_security | en | intermediate | capec | kwcyber_000246 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Cross-Site Flashing (CAPEC-178)ุ | CAPEC | ูู
ุท ุงููุฌูู
Cross-Site Flashing (CAPEC-178): An attacker is able to trick the victim into executing a Flash document that passes commands or calls to a Flash player browser plugin, allowing the attacker to exploit native Flash functionality in the client browser. This attack pattern occurs where an attacker can provide ... | web_security | ar | intermediate | capec | kwcyber_000247 |
How does Cross-Site Flashing attack work? | Attack Analysis | Technical analysis of Cross-Site Flashing (CAPEC-178): An attacker is able to trick the victim into executing a Flash document that passes commands or calls to a Flash player browser plugin, allowing the attacker to exploit native Flash functionality in the client browser. This attack pattern occurs where an attacker c... | web_security | en | advanced | capec | kwcyber_000248 |
What is Calling Micro-Services Directly (CAPEC-179) attack pattern? | CAPEC | Calling Micro-Services Directly (CAPEC-179): An attacker is able to discover and query Micro-services at a web location and thereby expose the Micro-services to further exploitation by gathering information about their implementation and function. Micro-services in web pages allow portions of a page to connect to the s... | web_security | en | intermediate | capec | kwcyber_000249 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Calling Micro-Services Directly (CAPEC-179)ุ | CAPEC | ูู
ุท ุงููุฌูู
Calling Micro-Services Directly (CAPEC-179): An attacker is able to discover and query Micro-services at a web location and thereby expose the Micro-services to further exploitation by gathering information about their implementation and function. Micro-services in web pages allow portions of a page to conne... | web_security | ar | intermediate | capec | kwcyber_000250 |
How does Calling Micro-Services Directly attack work? | Attack Analysis | Technical analysis of Calling Micro-Services Directly (CAPEC-179): An attacker is able to discover and query Micro-services at a web location and thereby expose the Micro-services to further exploitation by gathering information about their implementation and function. Micro-services in web pages allow portions of a pa... | web_security | en | advanced | capec | kwcyber_000251 |
What is XSS Targeting Non-Script Elements (CAPEC-18) attack pattern? | CAPEC | XSS Targeting Non-Script Elements (CAPEC-18): This attack is a form of Cross-Site Scripting (XSS) where malicious scripts are embedded in elements that are not expected to host scripts such as image tags (<img>), comments in XML documents (< !-CDATA->), etc. These tags may not be subject to the same input validation, o... | web_security | en | intermediate | capec | kwcyber_000252 |
ู
ุง ูู ูู
ุท ุงููุฌูู
XSS Targeting Non-Script Elements (CAPEC-18)ุ | CAPEC | ูู
ุท ุงููุฌูู
XSS Targeting Non-Script Elements (CAPEC-18): This attack is a form of Cross-Site Scripting (XSS) where malicious scripts are embedded in elements that are not expected to host scripts such as image tags (<img>), comments in XML documents (< !-CDATA->), etc. These tags may not be subject to the same input va... | web_security | ar | intermediate | capec | kwcyber_000253 |
How does XSS Targeting Non-Script Elements attack work? | Attack Analysis | Technical analysis of XSS Targeting Non-Script Elements (CAPEC-18): This attack is a form of Cross-Site Scripting (XSS) where malicious scripts are embedded in elements that are not expected to host scripts such as image tags (<img>), comments in XML documents (< !-CDATA->), etc. These tags may not be subject to the sa... | web_security | en | advanced | capec | kwcyber_000254 |
What is Exploiting Incorrectly Configured Access Control Security Levels (CAPEC-180) attack pattern? | CAPEC | Exploiting Incorrectly Configured Access Control Security Levels (CAPEC-180): An attacker exploits a weakness in the configuration of access controls and is able to bypass the intended protection that these measures guard against and thereby obtain unauthorized access to the system or network. Sensitive functionality s... | web_security | en | intermediate | capec | kwcyber_000255 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Exploiting Incorrectly Configured Access Control Security Levels (CAPEC-180)ุ | CAPEC | ูู
ุท ุงููุฌูู
Exploiting Incorrectly Configured Access Control Security Levels (CAPEC-180): An attacker exploits a weakness in the configuration of access controls and is able to bypass the intended protection that these measures guard against and thereby obtain unauthorized access to the system or network. Sensitive func... | web_security | ar | intermediate | capec | kwcyber_000256 |
How does Exploiting Incorrectly Configured Access Control Security Levels attack work? | Attack Analysis | Technical analysis of Exploiting Incorrectly Configured Access Control Security Levels (CAPEC-180): An attacker exploits a weakness in the configuration of access controls and is able to bypass the intended protection that these measures guard against and thereby obtain unauthorized access to the system or network. Sen... | web_security | en | advanced | capec | kwcyber_000257 |
What is Flash File Overlay (CAPEC-181) attack pattern? | CAPEC | Flash File Overlay (CAPEC-181): An attacker creates a transparent overlay using flash in order to intercept user actions for the purpose of performing a clickjacking attack. In this technique, the Flash file provides a transparent overlay over HTML content. Because the Flash application is on top of the content, user a... | web_security | en | intermediate | capec | kwcyber_000258 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Flash File Overlay (CAPEC-181)ุ | CAPEC | ูู
ุท ุงููุฌูู
Flash File Overlay (CAPEC-181): An attacker creates a transparent overlay using flash in order to intercept user actions for the purpose of performing a clickjacking attack. In this technique, the Flash file provides a transparent overlay over HTML content. Because the Flash application is on top of the cont... | web_security | ar | intermediate | capec | kwcyber_000259 |
How does Flash File Overlay attack work? | Attack Analysis | Technical analysis of Flash File Overlay (CAPEC-181): An attacker creates a transparent overlay using flash in order to intercept user actions for the purpose of performing a clickjacking attack. In this technique, the Flash file provides a transparent overlay over HTML content. Because the Flash application is on top ... | web_security | en | advanced | capec | kwcyber_000260 |
What is Flash Injection (CAPEC-182) attack pattern? | CAPEC | Flash Injection (CAPEC-182): An attacker tricks a victim to execute malicious flash content that executes commands or makes flash calls specified by the attacker. One example of this attack is cross-site flashing, an attacker controlled parameter to a reference call loads from content specified by the attacker. | web_security | en | intermediate | capec | kwcyber_000261 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Flash Injection (CAPEC-182)ุ | CAPEC | ูู
ุท ุงููุฌูู
Flash Injection (CAPEC-182): An attacker tricks a victim to execute malicious flash content that executes commands or makes flash calls specified by the attacker. One example of this attack is cross-site flashing, an attacker controlled parameter to a reference call loads from content specified by the attack... | web_security | ar | intermediate | capec | kwcyber_000262 |
How does Flash Injection attack work? | Attack Analysis | Technical analysis of Flash Injection (CAPEC-182): An attacker tricks a victim to execute malicious flash content that executes commands or makes flash calls specified by the attacker. One example of this attack is cross-site flashing, an attacker controlled parameter to a reference call loads from content specified by... | web_security | en | advanced | capec | kwcyber_000263 |
What is IMAP/SMTP Command Injection (CAPEC-183) attack pattern? | CAPEC | IMAP/SMTP Command Injection (CAPEC-183): An adversary exploits weaknesses in input validation on web-mail servers to execute commands on the IMAP/SMTP server. Web-mail servers often sit between the Internet and the IMAP or SMTP mail server. User requests are received by the web-mail servers which then query the back-en... | web_security | en | intermediate | capec | kwcyber_000264 |
ู
ุง ูู ูู
ุท ุงููุฌูู
IMAP/SMTP Command Injection (CAPEC-183)ุ | CAPEC | ูู
ุท ุงููุฌูู
IMAP/SMTP Command Injection (CAPEC-183): An adversary exploits weaknesses in input validation on web-mail servers to execute commands on the IMAP/SMTP server. Web-mail servers often sit between the Internet and the IMAP or SMTP mail server. User requests are received by the web-mail servers which then query ... | web_security | ar | intermediate | capec | kwcyber_000265 |
How does IMAP/SMTP Command Injection attack work? | Attack Analysis | Technical analysis of IMAP/SMTP Command Injection (CAPEC-183): An adversary exploits weaknesses in input validation on web-mail servers to execute commands on the IMAP/SMTP server. Web-mail servers often sit between the Internet and the IMAP or SMTP mail server. User requests are received by the web-mail servers which ... | web_security | en | advanced | capec | kwcyber_000266 |
What is Software Integrity Attack (CAPEC-184) attack pattern? | CAPEC | Software Integrity Attack (CAPEC-184): An attacker initiates a series of events designed to cause a user, program, server, or device to perform actions which undermine the integrity of software code, device data structures, or device firmware, achieving the modification of the target's integrity to achieve an insecure ... | web_security | en | intermediate | capec | kwcyber_000267 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Software Integrity Attack (CAPEC-184)ุ | CAPEC | ูู
ุท ุงููุฌูู
Software Integrity Attack (CAPEC-184): An attacker initiates a series of events designed to cause a user, program, server, or device to perform actions which undermine the integrity of software code, device data structures, or device firmware, achieving the modification of the target's integrity to achieve a... | web_security | ar | intermediate | capec | kwcyber_000268 |
How does Software Integrity Attack attack work? | Attack Analysis | Technical analysis of Software Integrity Attack (CAPEC-184): An attacker initiates a series of events designed to cause a user, program, server, or device to perform actions which undermine the integrity of software code, device data structures, or device firmware, achieving the modification of the target's integrity t... | web_security | en | advanced | capec | kwcyber_000269 |
What is Malicious Software Download (CAPEC-185) attack pattern? | CAPEC | Malicious Software Download (CAPEC-185): An attacker uses deceptive methods to cause a user or an automated process to download and install dangerous code that originates from an attacker controlled source. There are several variations to this strategy of attack. | web_security | en | intermediate | capec | kwcyber_000270 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Malicious Software Download (CAPEC-185)ุ | CAPEC | ูู
ุท ุงููุฌูู
Malicious Software Download (CAPEC-185): An attacker uses deceptive methods to cause a user or an automated process to download and install dangerous code that originates from an attacker controlled source. There are several variations to this strategy of attack. | web_security | ar | intermediate | capec | kwcyber_000271 |
How does Malicious Software Download attack work? | Attack Analysis | Technical analysis of Malicious Software Download (CAPEC-185): An attacker uses deceptive methods to cause a user or an automated process to download and install dangerous code that originates from an attacker controlled source. There are several variations to this strategy of attack. | web_security | en | advanced | capec | kwcyber_000272 |
What is Malicious Software Update (CAPEC-186) attack pattern? | CAPEC | Malicious Software Update (CAPEC-186): An adversary uses deceptive methods to cause a user or an automated process to download and install dangerous code believed to be a valid update that originates from an adversary controlled source. | web_security | en | intermediate | capec | kwcyber_000273 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Malicious Software Update (CAPEC-186)ุ | CAPEC | ูู
ุท ุงููุฌูู
Malicious Software Update (CAPEC-186): An adversary uses deceptive methods to cause a user or an automated process to download and install dangerous code believed to be a valid update that originates from an adversary controlled source. | web_security | ar | intermediate | capec | kwcyber_000274 |
How does Malicious Software Update attack work? | Attack Analysis | Technical analysis of Malicious Software Update (CAPEC-186): An adversary uses deceptive methods to cause a user or an automated process to download and install dangerous code believed to be a valid update that originates from an adversary controlled source. | web_security | en | advanced | capec | kwcyber_000275 |
What is Malicious Automated Software Update via Redirection (CAPEC-187) attack pattern? | CAPEC | Malicious Automated Software Update via Redirection (CAPEC-187): An attacker exploits two layers of weaknesses in server or client software for automated update mechanisms to undermine the integrity of the target code-base. The first weakness involves a failure to properly authenticate a server as a source of update or... | web_security | en | intermediate | capec | kwcyber_000276 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Malicious Automated Software Update via Redirection (CAPEC-187)ุ | CAPEC | ูู
ุท ุงููุฌูู
Malicious Automated Software Update via Redirection (CAPEC-187): An attacker exploits two layers of weaknesses in server or client software for automated update mechanisms to undermine the integrity of the target code-base. The first weakness involves a failure to properly authenticate a server as a source o... | web_security | ar | intermediate | capec | kwcyber_000277 |
How does Malicious Automated Software Update via Redirection attack work? | Attack Analysis | Technical analysis of Malicious Automated Software Update via Redirection (CAPEC-187): An attacker exploits two layers of weaknesses in server or client software for automated update mechanisms to undermine the integrity of the target code-base. The first weakness involves a failure to properly authenticate a server as... | web_security | en | advanced | capec | kwcyber_000278 |
What is Reverse Engineering (CAPEC-188) attack pattern? | CAPEC | Reverse Engineering (CAPEC-188): An adversary discovers the structure, function, and composition of an object, resource, or system by using a variety of analysis techniques to effectively determine how the analyzed entity was constructed or operates. The goal of reverse engineering is often to duplicate the function, o... | web_security | en | intermediate | capec | kwcyber_000279 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Reverse Engineering (CAPEC-188)ุ | CAPEC | ูู
ุท ุงููุฌูู
Reverse Engineering (CAPEC-188): An adversary discovers the structure, function, and composition of an object, resource, or system by using a variety of analysis techniques to effectively determine how the analyzed entity was constructed or operates. The goal of reverse engineering is often to duplicate the ... | web_security | ar | intermediate | capec | kwcyber_000280 |
How does Reverse Engineering attack work? | Attack Analysis | Technical analysis of Reverse Engineering (CAPEC-188): An adversary discovers the structure, function, and composition of an object, resource, or system by using a variety of analysis techniques to effectively determine how the analyzed entity was constructed or operates. The goal of reverse engineering is often to dup... | web_security | en | advanced | capec | kwcyber_000281 |
What is Black Box Reverse Engineering (CAPEC-189) attack pattern? | CAPEC | Black Box Reverse Engineering (CAPEC-189): An adversary discovers the structure, function, and composition of a type of computer software through black box analysis techniques. 'Black Box' methods involve interacting with the software indirectly, in the absence of direct access to the executable object. Such analysis t... | web_security | en | intermediate | capec | kwcyber_000282 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Black Box Reverse Engineering (CAPEC-189)ุ | CAPEC | ูู
ุท ุงููุฌูู
Black Box Reverse Engineering (CAPEC-189): An adversary discovers the structure, function, and composition of a type of computer software through black box analysis techniques. 'Black Box' methods involve interacting with the software indirectly, in the absence of direct access to the executable object. Such... | web_security | ar | intermediate | capec | kwcyber_000283 |
How does Black Box Reverse Engineering attack work? | Attack Analysis | Technical analysis of Black Box Reverse Engineering (CAPEC-189): An adversary discovers the structure, function, and composition of a type of computer software through black box analysis techniques. 'Black Box' methods involve interacting with the software indirectly, in the absence of direct access to the executable o... | web_security | en | advanced | capec | kwcyber_000284 |
What is Embedding Scripts within Scripts (CAPEC-19) attack pattern? | CAPEC | Embedding Scripts within Scripts (CAPEC-19): An adversary leverages the capability to execute their own script by embedding it within other scripts that the target software is likely to execute due to programs' vulnerabilities that are brought on by allowing remote hosts to execute scripts. | web_security | en | intermediate | capec | kwcyber_000285 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Embedding Scripts within Scripts (CAPEC-19)ุ | CAPEC | ูู
ุท ุงููุฌูู
Embedding Scripts within Scripts (CAPEC-19): An adversary leverages the capability to execute their own script by embedding it within other scripts that the target software is likely to execute due to programs' vulnerabilities that are brought on by allowing remote hosts to execute scripts. | web_security | ar | intermediate | capec | kwcyber_000286 |
How does Embedding Scripts within Scripts attack work? | Attack Analysis | Technical analysis of Embedding Scripts within Scripts (CAPEC-19): An adversary leverages the capability to execute their own script by embedding it within other scripts that the target software is likely to execute due to programs' vulnerabilities that are brought on by allowing remote hosts to execute scripts. | web_security | en | advanced | capec | kwcyber_000287 |
What is Reverse Engineer an Executable to Expose Assumed Hidden Functionality (CAPEC-190) attack pattern? | CAPEC | Reverse Engineer an Executable to Expose Assumed Hidden Functionality (CAPEC-190): An attacker analyzes a binary file or executable for the purpose of discovering the structure, function, and possibly source-code of the file by using a variety of analysis techniques to effectively determine how the software functions a... | web_security | en | intermediate | capec | kwcyber_000288 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Reverse Engineer an Executable to Expose Assumed Hidden Functionality (CAPEC-190)ุ | CAPEC | ูู
ุท ุงููุฌูู
Reverse Engineer an Executable to Expose Assumed Hidden Functionality (CAPEC-190): An attacker analyzes a binary file or executable for the purpose of discovering the structure, function, and possibly source-code of the file by using a variety of analysis techniques to effectively determine how the software ... | web_security | ar | intermediate | capec | kwcyber_000289 |
How does Reverse Engineer an Executable to Expose Assumed Hidden Functionality attack work? | Attack Analysis | Technical analysis of Reverse Engineer an Executable to Expose Assumed Hidden Functionality (CAPEC-190): An attacker analyzes a binary file or executable for the purpose of discovering the structure, function, and possibly source-code of the file by using a variety of analysis techniques to effectively determine how th... | web_security | en | advanced | capec | kwcyber_000290 |
What is Read Sensitive Constants Within an Executable (CAPEC-191) attack pattern? | CAPEC | Read Sensitive Constants Within an Executable (CAPEC-191): <xhtml:p>An adversary engages in activities to discover any sensitive constants present within the compiled code of an executable. These constants may include literal ASCII strings within the file itself, or possibly strings hard-coded into particular routines ... | web_security | en | intermediate | capec | kwcyber_000291 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Read Sensitive Constants Within an Executable (CAPEC-191)ุ | CAPEC | ูู
ุท ุงููุฌูู
Read Sensitive Constants Within an Executable (CAPEC-191): <xhtml:p>An adversary engages in activities to discover any sensitive constants present within the compiled code of an executable. These constants may include literal ASCII strings within the file itself, or possibly strings hard-coded into particula... | web_security | ar | intermediate | capec | kwcyber_000292 |
How does Read Sensitive Constants Within an Executable attack work? | Attack Analysis | Technical analysis of Read Sensitive Constants Within an Executable (CAPEC-191): <xhtml:p>An adversary engages in activities to discover any sensitive constants present within the compiled code of an executable. These constants may include literal ASCII strings within the file itself, or possibly strings hard-coded int... | web_security | en | advanced | capec | kwcyber_000293 |
What is Protocol Analysis (CAPEC-192) attack pattern? | CAPEC | Protocol Analysis (CAPEC-192): An adversary engages in activities to decipher and/or decode protocol information for a network or application communication protocol used for transmitting information between interconnected nodes or systems on a packet-switched data network. While this type of analysis involves the analy... | web_security | en | intermediate | capec | kwcyber_000294 |
ู
ุง ูู ูู
ุท ุงููุฌูู
Protocol Analysis (CAPEC-192)ุ | CAPEC | ูู
ุท ุงููุฌูู
Protocol Analysis (CAPEC-192): An adversary engages in activities to decipher and/or decode protocol information for a network or application communication protocol used for transmitting information between interconnected nodes or systems on a packet-switched data network. While this type of analysis involve... | web_security | ar | intermediate | capec | kwcyber_000295 |
How does Protocol Analysis attack work? | Attack Analysis | Technical analysis of Protocol Analysis (CAPEC-192): An adversary engages in activities to decipher and/or decode protocol information for a network or application communication protocol used for transmitting information between interconnected nodes or systems on a packet-switched data network. While this type of analy... | web_security | en | advanced | capec | kwcyber_000296 |
What is PHP Remote File Inclusion (CAPEC-193) attack pattern? | CAPEC | PHP Remote File Inclusion (CAPEC-193): In this pattern the adversary is able to load and execute arbitrary code remotely available from the application. This is usually accomplished through an insecurely configured PHP runtime environment and an improperly sanitized "include" or "require" call, which the user can then ... | web_security | en | intermediate | capec | kwcyber_000297 |
ู
ุง ูู ูู
ุท ุงููุฌูู
PHP Remote File Inclusion (CAPEC-193)ุ | CAPEC | ูู
ุท ุงููุฌูู
PHP Remote File Inclusion (CAPEC-193): In this pattern the adversary is able to load and execute arbitrary code remotely available from the application. This is usually accomplished through an insecurely configured PHP runtime environment and an improperly sanitized "include" or "require" call, which the use... | web_security | ar | intermediate | capec | kwcyber_000298 |
How does PHP Remote File Inclusion attack work? | Attack Analysis | Technical analysis of PHP Remote File Inclusion (CAPEC-193): In this pattern the adversary is able to load and execute arbitrary code remotely available from the application. This is usually accomplished through an insecurely configured PHP runtime environment and an improperly sanitized "include" or "require" call, wh... | web_security | en | advanced | capec | kwcyber_000299 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.