instruction
stringlengths
20
156
context
stringclasses
37 values
response
stringlengths
73
869
category
stringclasses
11 values
language
stringclasses
2 values
difficulty
stringclasses
4 values
source
stringclasses
8 values
id
stringlengths
14
14
How does Manipulating Hidden Fields attack work?
Attack Analysis
Technical analysis of Manipulating Hidden Fields (CAPEC-162): An adversary exploits a weakness in the server's trust of client-side processing by modifying data on the client-side, such as price information, and then submitting this data to the server, which processes the modified data. For example, eShoplifting is a d...
web_security
en
advanced
capec
kwcyber_000200
What is Spear Phishing (CAPEC-163) attack pattern?
CAPEC
Spear Phishing (CAPEC-163): An adversary targets a specific user or group with a Phishing (CAPEC-98) attack tailored to a category of users in order to have maximum relevance and deceptive capability. Spear Phishing is an enhanced version of the Phishing attack targeted to a specific user or group. The quality of the t...
web_security
en
intermediate
capec
kwcyber_000201
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Spear Phishing (CAPEC-163)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Spear Phishing (CAPEC-163): An adversary targets a specific user or group with a Phishing (CAPEC-98) attack tailored to a category of users in order to have maximum relevance and deceptive capability. Spear Phishing is an enhanced version of the Phishing attack targeted to a specific user or group. The quali...
web_security
ar
intermediate
capec
kwcyber_000202
How does Spear Phishing attack work?
Attack Analysis
Technical analysis of Spear Phishing (CAPEC-163): An adversary targets a specific user or group with a Phishing (CAPEC-98) attack tailored to a category of users in order to have maximum relevance and deceptive capability. Spear Phishing is an enhanced version of the Phishing attack targeted to a specific user or group...
web_security
en
advanced
capec
kwcyber_000203
What is Mobile Phishing (CAPEC-164) attack pattern?
CAPEC
Mobile Phishing (CAPEC-164): An adversary targets mobile phone users with a phishing attack for the purpose of soliciting account passwords or sensitive information from the user. Mobile Phishing is a variation of the Phishing social engineering technique where the attack is initiated via a text or SMS message, rather ...
web_security
en
intermediate
capec
kwcyber_000204
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Mobile Phishing (CAPEC-164)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Mobile Phishing (CAPEC-164): An adversary targets mobile phone users with a phishing attack for the purpose of soliciting account passwords or sensitive information from the user. Mobile Phishing is a variation of the Phishing social engineering technique where the attack is initiated via a text or SMS messa...
web_security
ar
intermediate
capec
kwcyber_000205
How does Mobile Phishing attack work?
Attack Analysis
Technical analysis of Mobile Phishing (CAPEC-164): An adversary targets mobile phone users with a phishing attack for the purpose of soliciting account passwords or sensitive information from the user. Mobile Phishing is a variation of the Phishing social engineering technique where the attack is initiated via a text o...
web_security
en
advanced
capec
kwcyber_000206
What is File Manipulation (CAPEC-165) attack pattern?
CAPEC
File Manipulation (CAPEC-165): An attacker modifies file contents or attributes (such as extensions or names) of files in a manner to cause incorrect processing by an application. Attackers use this class of attacks to cause applications to enter unstable states, overwrite or expose sensitive information, and even exec...
web_security
en
intermediate
capec
kwcyber_000207
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… File Manipulation (CAPEC-165)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… File Manipulation (CAPEC-165): An attacker modifies file contents or attributes (such as extensions or names) of files in a manner to cause incorrect processing by an application. Attackers use this class of attacks to cause applications to enter unstable states, overwrite or expose sensitive information, an...
web_security
ar
intermediate
capec
kwcyber_000208
How does File Manipulation attack work?
Attack Analysis
Technical analysis of File Manipulation (CAPEC-165): An attacker modifies file contents or attributes (such as extensions or names) of files in a manner to cause incorrect processing by an application. Attackers use this class of attacks to cause applications to enter unstable states, overwrite or expose sensitive info...
web_security
en
advanced
capec
kwcyber_000209
What is Force the System to Reset Values (CAPEC-166) attack pattern?
CAPEC
Force the System to Reset Values (CAPEC-166): An attacker forces the target into a previous state in order to leverage potential weaknesses in the target dependent upon a prior configuration or state-dependent factors. Even in cases where an attacker may not be able to directly control the configuration of the targeted...
web_security
en
intermediate
capec
kwcyber_000210
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Force the System to Reset Values (CAPEC-166)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Force the System to Reset Values (CAPEC-166): An attacker forces the target into a previous state in order to leverage potential weaknesses in the target dependent upon a prior configuration or state-dependent factors. Even in cases where an attacker may not be able to directly control the configuration of t...
web_security
ar
intermediate
capec
kwcyber_000211
How does Force the System to Reset Values attack work?
Attack Analysis
Technical analysis of Force the System to Reset Values (CAPEC-166): An attacker forces the target into a previous state in order to leverage potential weaknesses in the target dependent upon a prior configuration or state-dependent factors. Even in cases where an attacker may not be able to directly control the configu...
web_security
en
advanced
capec
kwcyber_000212
What is White Box Reverse Engineering (CAPEC-167) attack pattern?
CAPEC
White Box Reverse Engineering (CAPEC-167): An attacker discovers the structure, function, and composition of a type of computer software through white box analysis techniques. White box techniques involve methods which can be applied to a piece of software when an executable or some other compiled object can be directl...
web_security
en
intermediate
capec
kwcyber_000213
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… White Box Reverse Engineering (CAPEC-167)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… White Box Reverse Engineering (CAPEC-167): An attacker discovers the structure, function, and composition of a type of computer software through white box analysis techniques. White box techniques involve methods which can be applied to a piece of software when an executable or some other compiled object can...
web_security
ar
intermediate
capec
kwcyber_000214
How does White Box Reverse Engineering attack work?
Attack Analysis
Technical analysis of White Box Reverse Engineering (CAPEC-167): An attacker discovers the structure, function, and composition of a type of computer software through white box analysis techniques. White box techniques involve methods which can be applied to a piece of software when an executable or some other compiled...
web_security
en
advanced
capec
kwcyber_000215
What is Windows ::DATA Alternate Data Stream (CAPEC-168) attack pattern?
CAPEC
Windows ::DATA Alternate Data Stream (CAPEC-168): An attacker exploits the functionality of Microsoft NTFS Alternate Data Streams (ADS) to undermine system security. ADS allows multiple "files" to be stored in one directory entry referenced as filename:streamname. One or more alternate data streams may be stored in any...
web_security
en
intermediate
capec
kwcyber_000216
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Windows ::DATA Alternate Data Stream (CAPEC-168)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Windows ::DATA Alternate Data Stream (CAPEC-168): An attacker exploits the functionality of Microsoft NTFS Alternate Data Streams (ADS) to undermine system security. ADS allows multiple "files" to be stored in one directory entry referenced as filename:streamname. One or more alternate data streams may be st...
web_security
ar
intermediate
capec
kwcyber_000217
How does Windows ::DATA Alternate Data Stream attack work?
Attack Analysis
Technical analysis of Windows ::DATA Alternate Data Stream (CAPEC-168): An attacker exploits the functionality of Microsoft NTFS Alternate Data Streams (ADS) to undermine system security. ADS allows multiple "files" to be stored in one directory entry referenced as filename:streamname. One or more alternate data stream...
web_security
en
advanced
capec
kwcyber_000218
What is Footprinting (CAPEC-169) attack pattern?
CAPEC
Footprinting (CAPEC-169): An adversary engages in probing and exploration activities to identify constituents and properties of the target.
web_security
en
intermediate
capec
kwcyber_000219
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Footprinting (CAPEC-169)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Footprinting (CAPEC-169): An adversary engages in probing and exploration activities to identify constituents and properties of the target.
web_security
ar
intermediate
capec
kwcyber_000220
How does Footprinting attack work?
Attack Analysis
Technical analysis of Footprinting (CAPEC-169): An adversary engages in probing and exploration activities to identify constituents and properties of the target.
web_security
en
advanced
capec
kwcyber_000221
What is Using Malicious Files (CAPEC-17) attack pattern?
CAPEC
Using Malicious Files (CAPEC-17): An attack of this type exploits a system's configuration that allows an adversary to either directly access an executable file, for example through shell access; or in a possible worst case allows an adversary to upload a file and then execute it. Web servers, ftp servers, and message ...
web_security
en
intermediate
capec
kwcyber_000222
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Using Malicious Files (CAPEC-17)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Using Malicious Files (CAPEC-17): An attack of this type exploits a system's configuration that allows an adversary to either directly access an executable file, for example through shell access; or in a possible worst case allows an adversary to upload a file and then execute it. Web servers, ftp servers, a...
web_security
ar
intermediate
capec
kwcyber_000223
How does Using Malicious Files attack work?
Attack Analysis
Technical analysis of Using Malicious Files (CAPEC-17): An attack of this type exploits a system's configuration that allows an adversary to either directly access an executable file, for example through shell access; or in a possible worst case allows an adversary to upload a file and then execute it. Web servers, ftp...
web_security
en
advanced
capec
kwcyber_000224
What is Web Application Fingerprinting (CAPEC-170) attack pattern?
CAPEC
Web Application Fingerprinting (CAPEC-170): An attacker sends a series of probes to a web application in order to elicit version-dependent and type-dependent behavior that assists in identifying the target. An attacker could learn information such as software versions, error pages, and response headers, variations in i...
web_security
en
intermediate
capec
kwcyber_000225
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Web Application Fingerprinting (CAPEC-170)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Web Application Fingerprinting (CAPEC-170): An attacker sends a series of probes to a web application in order to elicit version-dependent and type-dependent behavior that assists in identifying the target. An attacker could learn information such as software versions, error pages, and response headers, vari...
web_security
ar
intermediate
capec
kwcyber_000226
How does Web Application Fingerprinting attack work?
Attack Analysis
Technical analysis of Web Application Fingerprinting (CAPEC-170): An attacker sends a series of probes to a web application in order to elicit version-dependent and type-dependent behavior that assists in identifying the target. An attacker could learn information such as software versions, error pages, and response he...
web_security
en
advanced
capec
kwcyber_000227
What is DEPRECATED: Variable Manipulation (CAPEC-171) attack pattern?
CAPEC
DEPRECATED: Variable Manipulation (CAPEC-171): This attack pattern has been deprecated as it is a duplicate of the existing attack pattern "CAPEC-77 : Manipulating User-Controlled Variables". Please refer to this other CAPEC going forward.
web_security
en
intermediate
capec
kwcyber_000228
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… DEPRECATED: Variable Manipulation (CAPEC-171)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… DEPRECATED: Variable Manipulation (CAPEC-171): This attack pattern has been deprecated as it is a duplicate of the existing attack pattern "CAPEC-77 : Manipulating User-Controlled Variables". Please refer to this other CAPEC going forward.
web_security
ar
intermediate
capec
kwcyber_000229
How does DEPRECATED: Variable Manipulation attack work?
Attack Analysis
Technical analysis of DEPRECATED: Variable Manipulation (CAPEC-171): This attack pattern has been deprecated as it is a duplicate of the existing attack pattern "CAPEC-77 : Manipulating User-Controlled Variables". Please refer to this other CAPEC going forward.
web_security
en
advanced
capec
kwcyber_000230
What is Action Spoofing (CAPEC-173) attack pattern?
CAPEC
Action Spoofing (CAPEC-173): An adversary is able to disguise one action for another and therefore trick a user into initiating one type of action when they intend to initiate a different action. For example, a user might be led to believe that clicking a button will submit a query, but in fact it downloads software. A...
web_security
en
intermediate
capec
kwcyber_000231
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Action Spoofing (CAPEC-173)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Action Spoofing (CAPEC-173): An adversary is able to disguise one action for another and therefore trick a user into initiating one type of action when they intend to initiate a different action. For example, a user might be led to believe that clicking a button will submit a query, but in fact it downloads ...
web_security
ar
intermediate
capec
kwcyber_000232
How does Action Spoofing attack work?
Attack Analysis
Technical analysis of Action Spoofing (CAPEC-173): An adversary is able to disguise one action for another and therefore trick a user into initiating one type of action when they intend to initiate a different action. For example, a user might be led to believe that clicking a button will submit a query, but in fact it...
web_security
en
advanced
capec
kwcyber_000233
What is Flash Parameter Injection (CAPEC-174) attack pattern?
CAPEC
Flash Parameter Injection (CAPEC-174): An adversary takes advantage of improper data validation to inject malicious global parameters into a Flash file embedded within an HTML document. Flash files can leverage user-submitted data to configure the Flash document and access the embedding HTML document.
web_security
en
intermediate
capec
kwcyber_000234
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Flash Parameter Injection (CAPEC-174)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Flash Parameter Injection (CAPEC-174): An adversary takes advantage of improper data validation to inject malicious global parameters into a Flash file embedded within an HTML document. Flash files can leverage user-submitted data to configure the Flash document and access the embedding HTML document.
web_security
ar
intermediate
capec
kwcyber_000235
How does Flash Parameter Injection attack work?
Attack Analysis
Technical analysis of Flash Parameter Injection (CAPEC-174): An adversary takes advantage of improper data validation to inject malicious global parameters into a Flash file embedded within an HTML document. Flash files can leverage user-submitted data to configure the Flash document and access the embedding HTML docum...
web_security
en
advanced
capec
kwcyber_000236
What is Code Inclusion (CAPEC-175) attack pattern?
CAPEC
Code Inclusion (CAPEC-175): An adversary exploits a weakness on the target to force arbitrary code to be retrieved locally or from a remote location and executed. This differs from code injection in that code injection involves the direct inclusion of code while code inclusion involves the addition or replacement of a ...
web_security
en
intermediate
capec
kwcyber_000237
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Code Inclusion (CAPEC-175)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Code Inclusion (CAPEC-175): An adversary exploits a weakness on the target to force arbitrary code to be retrieved locally or from a remote location and executed. This differs from code injection in that code injection involves the direct inclusion of code while code inclusion involves the addition or replac...
web_security
ar
intermediate
capec
kwcyber_000238
How does Code Inclusion attack work?
Attack Analysis
Technical analysis of Code Inclusion (CAPEC-175): An adversary exploits a weakness on the target to force arbitrary code to be retrieved locally or from a remote location and executed. This differs from code injection in that code injection involves the direct inclusion of code while code inclusion involves the additio...
web_security
en
advanced
capec
kwcyber_000239
What is Configuration/Environment Manipulation (CAPEC-176) attack pattern?
CAPEC
Configuration/Environment Manipulation (CAPEC-176): An attacker manipulates files or settings external to a target application which affect the behavior of that application. For example, many applications use external configuration files and libraries - modification of these entities or otherwise affecting the applicat...
web_security
en
intermediate
capec
kwcyber_000240
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Configuration/Environment Manipulation (CAPEC-176)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Configuration/Environment Manipulation (CAPEC-176): An attacker manipulates files or settings external to a target application which affect the behavior of that application. For example, many applications use external configuration files and libraries - modification of these entities or otherwise affecting t...
web_security
ar
intermediate
capec
kwcyber_000241
How does Configuration/Environment Manipulation attack work?
Attack Analysis
Technical analysis of Configuration/Environment Manipulation (CAPEC-176): An attacker manipulates files or settings external to a target application which affect the behavior of that application. For example, many applications use external configuration files and libraries - modification of these entities or otherwise ...
web_security
en
advanced
capec
kwcyber_000242
What is Create files with the same name as files protected with a higher classification (CAPEC-177) attack pattern?
CAPEC
Create files with the same name as files protected with a higher classification (CAPEC-177): An attacker exploits file location algorithms in an operating system or application by creating a file with the same name as a protected or privileged file. The attacker could manipulate the system if the attacker-created file ...
web_security
en
intermediate
capec
kwcyber_000243
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Create files with the same name as files protected with a higher classification (CAPEC-177)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Create files with the same name as files protected with a higher classification (CAPEC-177): An attacker exploits file location algorithms in an operating system or application by creating a file with the same name as a protected or privileged file. The attacker could manipulate the system if the attacker-cr...
web_security
ar
intermediate
capec
kwcyber_000244
How does Create files with the same name as files protected with a higher classification attack work?
Attack Analysis
Technical analysis of Create files with the same name as files protected with a higher classification (CAPEC-177): An attacker exploits file location algorithms in an operating system or application by creating a file with the same name as a protected or privileged file. The attacker could manipulate the system if the ...
web_security
en
advanced
capec
kwcyber_000245
What is Cross-Site Flashing (CAPEC-178) attack pattern?
CAPEC
Cross-Site Flashing (CAPEC-178): An attacker is able to trick the victim into executing a Flash document that passes commands or calls to a Flash player browser plugin, allowing the attacker to exploit native Flash functionality in the client browser. This attack pattern occurs where an attacker can provide a crafted l...
web_security
en
intermediate
capec
kwcyber_000246
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Cross-Site Flashing (CAPEC-178)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Cross-Site Flashing (CAPEC-178): An attacker is able to trick the victim into executing a Flash document that passes commands or calls to a Flash player browser plugin, allowing the attacker to exploit native Flash functionality in the client browser. This attack pattern occurs where an attacker can provide ...
web_security
ar
intermediate
capec
kwcyber_000247
How does Cross-Site Flashing attack work?
Attack Analysis
Technical analysis of Cross-Site Flashing (CAPEC-178): An attacker is able to trick the victim into executing a Flash document that passes commands or calls to a Flash player browser plugin, allowing the attacker to exploit native Flash functionality in the client browser. This attack pattern occurs where an attacker c...
web_security
en
advanced
capec
kwcyber_000248
What is Calling Micro-Services Directly (CAPEC-179) attack pattern?
CAPEC
Calling Micro-Services Directly (CAPEC-179): An attacker is able to discover and query Micro-services at a web location and thereby expose the Micro-services to further exploitation by gathering information about their implementation and function. Micro-services in web pages allow portions of a page to connect to the s...
web_security
en
intermediate
capec
kwcyber_000249
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Calling Micro-Services Directly (CAPEC-179)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Calling Micro-Services Directly (CAPEC-179): An attacker is able to discover and query Micro-services at a web location and thereby expose the Micro-services to further exploitation by gathering information about their implementation and function. Micro-services in web pages allow portions of a page to conne...
web_security
ar
intermediate
capec
kwcyber_000250
How does Calling Micro-Services Directly attack work?
Attack Analysis
Technical analysis of Calling Micro-Services Directly (CAPEC-179): An attacker is able to discover and query Micro-services at a web location and thereby expose the Micro-services to further exploitation by gathering information about their implementation and function. Micro-services in web pages allow portions of a pa...
web_security
en
advanced
capec
kwcyber_000251
What is XSS Targeting Non-Script Elements (CAPEC-18) attack pattern?
CAPEC
XSS Targeting Non-Script Elements (CAPEC-18): This attack is a form of Cross-Site Scripting (XSS) where malicious scripts are embedded in elements that are not expected to host scripts such as image tags (<img>), comments in XML documents (< !-CDATA->), etc. These tags may not be subject to the same input validation, o...
web_security
en
intermediate
capec
kwcyber_000252
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… XSS Targeting Non-Script Elements (CAPEC-18)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… XSS Targeting Non-Script Elements (CAPEC-18): This attack is a form of Cross-Site Scripting (XSS) where malicious scripts are embedded in elements that are not expected to host scripts such as image tags (<img>), comments in XML documents (< !-CDATA->), etc. These tags may not be subject to the same input va...
web_security
ar
intermediate
capec
kwcyber_000253
How does XSS Targeting Non-Script Elements attack work?
Attack Analysis
Technical analysis of XSS Targeting Non-Script Elements (CAPEC-18): This attack is a form of Cross-Site Scripting (XSS) where malicious scripts are embedded in elements that are not expected to host scripts such as image tags (<img>), comments in XML documents (< !-CDATA->), etc. These tags may not be subject to the sa...
web_security
en
advanced
capec
kwcyber_000254
What is Exploiting Incorrectly Configured Access Control Security Levels (CAPEC-180) attack pattern?
CAPEC
Exploiting Incorrectly Configured Access Control Security Levels (CAPEC-180): An attacker exploits a weakness in the configuration of access controls and is able to bypass the intended protection that these measures guard against and thereby obtain unauthorized access to the system or network. Sensitive functionality s...
web_security
en
intermediate
capec
kwcyber_000255
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Exploiting Incorrectly Configured Access Control Security Levels (CAPEC-180)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Exploiting Incorrectly Configured Access Control Security Levels (CAPEC-180): An attacker exploits a weakness in the configuration of access controls and is able to bypass the intended protection that these measures guard against and thereby obtain unauthorized access to the system or network. Sensitive func...
web_security
ar
intermediate
capec
kwcyber_000256
How does Exploiting Incorrectly Configured Access Control Security Levels attack work?
Attack Analysis
Technical analysis of Exploiting Incorrectly Configured Access Control Security Levels (CAPEC-180): An attacker exploits a weakness in the configuration of access controls and is able to bypass the intended protection that these measures guard against and thereby obtain unauthorized access to the system or network. Sen...
web_security
en
advanced
capec
kwcyber_000257
What is Flash File Overlay (CAPEC-181) attack pattern?
CAPEC
Flash File Overlay (CAPEC-181): An attacker creates a transparent overlay using flash in order to intercept user actions for the purpose of performing a clickjacking attack. In this technique, the Flash file provides a transparent overlay over HTML content. Because the Flash application is on top of the content, user a...
web_security
en
intermediate
capec
kwcyber_000258
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Flash File Overlay (CAPEC-181)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Flash File Overlay (CAPEC-181): An attacker creates a transparent overlay using flash in order to intercept user actions for the purpose of performing a clickjacking attack. In this technique, the Flash file provides a transparent overlay over HTML content. Because the Flash application is on top of the cont...
web_security
ar
intermediate
capec
kwcyber_000259
How does Flash File Overlay attack work?
Attack Analysis
Technical analysis of Flash File Overlay (CAPEC-181): An attacker creates a transparent overlay using flash in order to intercept user actions for the purpose of performing a clickjacking attack. In this technique, the Flash file provides a transparent overlay over HTML content. Because the Flash application is on top ...
web_security
en
advanced
capec
kwcyber_000260
What is Flash Injection (CAPEC-182) attack pattern?
CAPEC
Flash Injection (CAPEC-182): An attacker tricks a victim to execute malicious flash content that executes commands or makes flash calls specified by the attacker. One example of this attack is cross-site flashing, an attacker controlled parameter to a reference call loads from content specified by the attacker.
web_security
en
intermediate
capec
kwcyber_000261
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Flash Injection (CAPEC-182)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Flash Injection (CAPEC-182): An attacker tricks a victim to execute malicious flash content that executes commands or makes flash calls specified by the attacker. One example of this attack is cross-site flashing, an attacker controlled parameter to a reference call loads from content specified by the attack...
web_security
ar
intermediate
capec
kwcyber_000262
How does Flash Injection attack work?
Attack Analysis
Technical analysis of Flash Injection (CAPEC-182): An attacker tricks a victim to execute malicious flash content that executes commands or makes flash calls specified by the attacker. One example of this attack is cross-site flashing, an attacker controlled parameter to a reference call loads from content specified by...
web_security
en
advanced
capec
kwcyber_000263
What is IMAP/SMTP Command Injection (CAPEC-183) attack pattern?
CAPEC
IMAP/SMTP Command Injection (CAPEC-183): An adversary exploits weaknesses in input validation on web-mail servers to execute commands on the IMAP/SMTP server. Web-mail servers often sit between the Internet and the IMAP or SMTP mail server. User requests are received by the web-mail servers which then query the back-en...
web_security
en
intermediate
capec
kwcyber_000264
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… IMAP/SMTP Command Injection (CAPEC-183)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… IMAP/SMTP Command Injection (CAPEC-183): An adversary exploits weaknesses in input validation on web-mail servers to execute commands on the IMAP/SMTP server. Web-mail servers often sit between the Internet and the IMAP or SMTP mail server. User requests are received by the web-mail servers which then query ...
web_security
ar
intermediate
capec
kwcyber_000265
How does IMAP/SMTP Command Injection attack work?
Attack Analysis
Technical analysis of IMAP/SMTP Command Injection (CAPEC-183): An adversary exploits weaknesses in input validation on web-mail servers to execute commands on the IMAP/SMTP server. Web-mail servers often sit between the Internet and the IMAP or SMTP mail server. User requests are received by the web-mail servers which ...
web_security
en
advanced
capec
kwcyber_000266
What is Software Integrity Attack (CAPEC-184) attack pattern?
CAPEC
Software Integrity Attack (CAPEC-184): An attacker initiates a series of events designed to cause a user, program, server, or device to perform actions which undermine the integrity of software code, device data structures, or device firmware, achieving the modification of the target's integrity to achieve an insecure ...
web_security
en
intermediate
capec
kwcyber_000267
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Software Integrity Attack (CAPEC-184)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Software Integrity Attack (CAPEC-184): An attacker initiates a series of events designed to cause a user, program, server, or device to perform actions which undermine the integrity of software code, device data structures, or device firmware, achieving the modification of the target's integrity to achieve a...
web_security
ar
intermediate
capec
kwcyber_000268
How does Software Integrity Attack attack work?
Attack Analysis
Technical analysis of Software Integrity Attack (CAPEC-184): An attacker initiates a series of events designed to cause a user, program, server, or device to perform actions which undermine the integrity of software code, device data structures, or device firmware, achieving the modification of the target's integrity t...
web_security
en
advanced
capec
kwcyber_000269
What is Malicious Software Download (CAPEC-185) attack pattern?
CAPEC
Malicious Software Download (CAPEC-185): An attacker uses deceptive methods to cause a user or an automated process to download and install dangerous code that originates from an attacker controlled source. There are several variations to this strategy of attack.
web_security
en
intermediate
capec
kwcyber_000270
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Malicious Software Download (CAPEC-185)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Malicious Software Download (CAPEC-185): An attacker uses deceptive methods to cause a user or an automated process to download and install dangerous code that originates from an attacker controlled source. There are several variations to this strategy of attack.
web_security
ar
intermediate
capec
kwcyber_000271
How does Malicious Software Download attack work?
Attack Analysis
Technical analysis of Malicious Software Download (CAPEC-185): An attacker uses deceptive methods to cause a user or an automated process to download and install dangerous code that originates from an attacker controlled source. There are several variations to this strategy of attack.
web_security
en
advanced
capec
kwcyber_000272
What is Malicious Software Update (CAPEC-186) attack pattern?
CAPEC
Malicious Software Update (CAPEC-186): An adversary uses deceptive methods to cause a user or an automated process to download and install dangerous code believed to be a valid update that originates from an adversary controlled source.
web_security
en
intermediate
capec
kwcyber_000273
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Malicious Software Update (CAPEC-186)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Malicious Software Update (CAPEC-186): An adversary uses deceptive methods to cause a user or an automated process to download and install dangerous code believed to be a valid update that originates from an adversary controlled source.
web_security
ar
intermediate
capec
kwcyber_000274
How does Malicious Software Update attack work?
Attack Analysis
Technical analysis of Malicious Software Update (CAPEC-186): An adversary uses deceptive methods to cause a user or an automated process to download and install dangerous code believed to be a valid update that originates from an adversary controlled source.
web_security
en
advanced
capec
kwcyber_000275
What is Malicious Automated Software Update via Redirection (CAPEC-187) attack pattern?
CAPEC
Malicious Automated Software Update via Redirection (CAPEC-187): An attacker exploits two layers of weaknesses in server or client software for automated update mechanisms to undermine the integrity of the target code-base. The first weakness involves a failure to properly authenticate a server as a source of update or...
web_security
en
intermediate
capec
kwcyber_000276
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Malicious Automated Software Update via Redirection (CAPEC-187)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Malicious Automated Software Update via Redirection (CAPEC-187): An attacker exploits two layers of weaknesses in server or client software for automated update mechanisms to undermine the integrity of the target code-base. The first weakness involves a failure to properly authenticate a server as a source o...
web_security
ar
intermediate
capec
kwcyber_000277
How does Malicious Automated Software Update via Redirection attack work?
Attack Analysis
Technical analysis of Malicious Automated Software Update via Redirection (CAPEC-187): An attacker exploits two layers of weaknesses in server or client software for automated update mechanisms to undermine the integrity of the target code-base. The first weakness involves a failure to properly authenticate a server as...
web_security
en
advanced
capec
kwcyber_000278
What is Reverse Engineering (CAPEC-188) attack pattern?
CAPEC
Reverse Engineering (CAPEC-188): An adversary discovers the structure, function, and composition of an object, resource, or system by using a variety of analysis techniques to effectively determine how the analyzed entity was constructed or operates. The goal of reverse engineering is often to duplicate the function, o...
web_security
en
intermediate
capec
kwcyber_000279
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Reverse Engineering (CAPEC-188)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Reverse Engineering (CAPEC-188): An adversary discovers the structure, function, and composition of an object, resource, or system by using a variety of analysis techniques to effectively determine how the analyzed entity was constructed or operates. The goal of reverse engineering is often to duplicate the ...
web_security
ar
intermediate
capec
kwcyber_000280
How does Reverse Engineering attack work?
Attack Analysis
Technical analysis of Reverse Engineering (CAPEC-188): An adversary discovers the structure, function, and composition of an object, resource, or system by using a variety of analysis techniques to effectively determine how the analyzed entity was constructed or operates. The goal of reverse engineering is often to dup...
web_security
en
advanced
capec
kwcyber_000281
What is Black Box Reverse Engineering (CAPEC-189) attack pattern?
CAPEC
Black Box Reverse Engineering (CAPEC-189): An adversary discovers the structure, function, and composition of a type of computer software through black box analysis techniques. 'Black Box' methods involve interacting with the software indirectly, in the absence of direct access to the executable object. Such analysis t...
web_security
en
intermediate
capec
kwcyber_000282
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Black Box Reverse Engineering (CAPEC-189)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Black Box Reverse Engineering (CAPEC-189): An adversary discovers the structure, function, and composition of a type of computer software through black box analysis techniques. 'Black Box' methods involve interacting with the software indirectly, in the absence of direct access to the executable object. Such...
web_security
ar
intermediate
capec
kwcyber_000283
How does Black Box Reverse Engineering attack work?
Attack Analysis
Technical analysis of Black Box Reverse Engineering (CAPEC-189): An adversary discovers the structure, function, and composition of a type of computer software through black box analysis techniques. 'Black Box' methods involve interacting with the software indirectly, in the absence of direct access to the executable o...
web_security
en
advanced
capec
kwcyber_000284
What is Embedding Scripts within Scripts (CAPEC-19) attack pattern?
CAPEC
Embedding Scripts within Scripts (CAPEC-19): An adversary leverages the capability to execute their own script by embedding it within other scripts that the target software is likely to execute due to programs' vulnerabilities that are brought on by allowing remote hosts to execute scripts.
web_security
en
intermediate
capec
kwcyber_000285
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Embedding Scripts within Scripts (CAPEC-19)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Embedding Scripts within Scripts (CAPEC-19): An adversary leverages the capability to execute their own script by embedding it within other scripts that the target software is likely to execute due to programs' vulnerabilities that are brought on by allowing remote hosts to execute scripts.
web_security
ar
intermediate
capec
kwcyber_000286
How does Embedding Scripts within Scripts attack work?
Attack Analysis
Technical analysis of Embedding Scripts within Scripts (CAPEC-19): An adversary leverages the capability to execute their own script by embedding it within other scripts that the target software is likely to execute due to programs' vulnerabilities that are brought on by allowing remote hosts to execute scripts.
web_security
en
advanced
capec
kwcyber_000287
What is Reverse Engineer an Executable to Expose Assumed Hidden Functionality (CAPEC-190) attack pattern?
CAPEC
Reverse Engineer an Executable to Expose Assumed Hidden Functionality (CAPEC-190): An attacker analyzes a binary file or executable for the purpose of discovering the structure, function, and possibly source-code of the file by using a variety of analysis techniques to effectively determine how the software functions a...
web_security
en
intermediate
capec
kwcyber_000288
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Reverse Engineer an Executable to Expose Assumed Hidden Functionality (CAPEC-190)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Reverse Engineer an Executable to Expose Assumed Hidden Functionality (CAPEC-190): An attacker analyzes a binary file or executable for the purpose of discovering the structure, function, and possibly source-code of the file by using a variety of analysis techniques to effectively determine how the software ...
web_security
ar
intermediate
capec
kwcyber_000289
How does Reverse Engineer an Executable to Expose Assumed Hidden Functionality attack work?
Attack Analysis
Technical analysis of Reverse Engineer an Executable to Expose Assumed Hidden Functionality (CAPEC-190): An attacker analyzes a binary file or executable for the purpose of discovering the structure, function, and possibly source-code of the file by using a variety of analysis techniques to effectively determine how th...
web_security
en
advanced
capec
kwcyber_000290
What is Read Sensitive Constants Within an Executable (CAPEC-191) attack pattern?
CAPEC
Read Sensitive Constants Within an Executable (CAPEC-191): <xhtml:p>An adversary engages in activities to discover any sensitive constants present within the compiled code of an executable. These constants may include literal ASCII strings within the file itself, or possibly strings hard-coded into particular routines ...
web_security
en
intermediate
capec
kwcyber_000291
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Read Sensitive Constants Within an Executable (CAPEC-191)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Read Sensitive Constants Within an Executable (CAPEC-191): <xhtml:p>An adversary engages in activities to discover any sensitive constants present within the compiled code of an executable. These constants may include literal ASCII strings within the file itself, or possibly strings hard-coded into particula...
web_security
ar
intermediate
capec
kwcyber_000292
How does Read Sensitive Constants Within an Executable attack work?
Attack Analysis
Technical analysis of Read Sensitive Constants Within an Executable (CAPEC-191): <xhtml:p>An adversary engages in activities to discover any sensitive constants present within the compiled code of an executable. These constants may include literal ASCII strings within the file itself, or possibly strings hard-coded int...
web_security
en
advanced
capec
kwcyber_000293
What is Protocol Analysis (CAPEC-192) attack pattern?
CAPEC
Protocol Analysis (CAPEC-192): An adversary engages in activities to decipher and/or decode protocol information for a network or application communication protocol used for transmitting information between interconnected nodes or systems on a packet-switched data network. While this type of analysis involves the analy...
web_security
en
intermediate
capec
kwcyber_000294
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… Protocol Analysis (CAPEC-192)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… Protocol Analysis (CAPEC-192): An adversary engages in activities to decipher and/or decode protocol information for a network or application communication protocol used for transmitting information between interconnected nodes or systems on a packet-switched data network. While this type of analysis involve...
web_security
ar
intermediate
capec
kwcyber_000295
How does Protocol Analysis attack work?
Attack Analysis
Technical analysis of Protocol Analysis (CAPEC-192): An adversary engages in activities to decipher and/or decode protocol information for a network or application communication protocol used for transmitting information between interconnected nodes or systems on a packet-switched data network. While this type of analy...
web_security
en
advanced
capec
kwcyber_000296
What is PHP Remote File Inclusion (CAPEC-193) attack pattern?
CAPEC
PHP Remote File Inclusion (CAPEC-193): In this pattern the adversary is able to load and execute arbitrary code remotely available from the application. This is usually accomplished through an insecurely configured PHP runtime environment and an improperly sanitized "include" or "require" call, which the user can then ...
web_security
en
intermediate
capec
kwcyber_000297
ู…ุง ู‡ูˆ ู†ู…ุท ุงู„ู‡ุฌูˆู… PHP Remote File Inclusion (CAPEC-193)ุŸ
CAPEC
ู†ู…ุท ุงู„ู‡ุฌูˆู… PHP Remote File Inclusion (CAPEC-193): In this pattern the adversary is able to load and execute arbitrary code remotely available from the application. This is usually accomplished through an insecurely configured PHP runtime environment and an improperly sanitized "include" or "require" call, which the use...
web_security
ar
intermediate
capec
kwcyber_000298
How does PHP Remote File Inclusion attack work?
Attack Analysis
Technical analysis of PHP Remote File Inclusion (CAPEC-193): In this pattern the adversary is able to load and execute arbitrary code remotely available from the application. This is usually accomplished through an insecurely configured PHP runtime environment and an improperly sanitized "include" or "require" call, wh...
web_security
en
advanced
capec
kwcyber_000299