CAPEC攻击模式浏览
Common Attack Pattern Enumeration and Classification(通用攻击模式枚举与分类)- 常见攻击模式的综合字典和分类
总攻击模式数
615
分类数
78
视图数
13
CAPEC攻击模式树型结构
CAPEC-1
Accessing Functionality Not Properly Constrained by ACLs
Standard
CAPEC-58
Restful Privilege Elevation
Detailed
CAPEC-679
Exploitation of Improperly Configured or Implemented Memory Protections
Detailed
CAPEC-680
Exploitation of Improperly Controlled Registers
Detailed
CAPEC-681
Exploitation of Improperly Controlled Hardware Security Identifiers
Detailed
CAPEC-100
Overflow Buffers
Standard
CAPEC-10
Buffer Overflow via Environment Variables
Detailed
CAPEC-14
Client-side Injection-induced Buffer Overflow
Detailed
CAPEC-24
Filter Failure through Buffer Overflow
Detailed
CAPEC-256
SOAP Array Overflow
Detailed
CAPEC-42
MIME Conversion
Detailed
CAPEC-44
Overflow Binary Resource File
Detailed
CAPEC-45
Buffer Overflow via Symbolic Links
Detailed
CAPEC-46
Overflow Variables and Tags
Detailed
CAPEC-47
Buffer Overflow via Parameter Expansion
Detailed
CAPEC-67
String Format Overflow in syslog()
Detailed
CAPEC-8
Buffer Overflow in an API Call
Detailed
CAPEC-9
Buffer Overflow in Local Command-Line Utilities
Detailed
CAPEC-103
Clickjacking
Standard
CAPEC-181
Flash File Overlay
Detailed
CAPEC-222
iFrame Overlay
Detailed
CAPEC-587
Cross Frame Scripting (XFS)
Detailed
CAPEC-104
Cross Zone Scripting
Standard
CAPEC-106
DEPRECATED: XSS through Log Files
Detailed
CAPEC-111
JSON Hijacking (aka JavaScript Hijacking)
Standard
CAPEC-112
Brute Force
Meta
CAPEC-20
Encryption Brute Forcing
Standard
CAPEC-49
Password Brute Forcing
Standard
CAPEC-16
Dictionary-based Password Attack
Detailed
CAPEC-55
Rainbow Table Password Cracking
Detailed
CAPEC-565
Password Spraying
Detailed
CAPEC-70
Try Common or Default Usernames and Passwords
Detailed
CAPEC-113
Interface Manipulation
Meta
CAPEC-121
Exploit Non-Production Interfaces
Standard
CAPEC-661
Root/Jailbreak Detection Evasion via Debugging
Detailed
CAPEC-133
Try All Common Switches
Standard
CAPEC-160
Exploit Script-Based APIs
Standard
CAPEC-36
Using Unpublished Interfaces or Functionality
Standard
CAPEC-114
Authentication Abuse
Meta
CAPEC-90
Reflection Attack in Authentication Protocol
Standard
CAPEC-115
Authentication Bypass
Meta
CAPEC-461
Web Services API Signature Forgery Leveraging Hash Function Extension Weakness
Standard
CAPEC-480
Escaping Virtualization
Standard
CAPEC-237
Escaping a Sandbox by Calling Code in Another Language
Detailed
CAPEC-664
Server Side Request Forgery
Standard
CAPEC-668
Key Negotiation of Bluetooth Attack (KNOB)
Standard
CAPEC-87
Forceful Browsing
Standard
CAPEC-116
Excavation
Meta
CAPEC-150
Collect Data from Common Resource Locations
Standard
CAPEC-143
Detect Unpublicized Web Pages
Detailed
CAPEC-144
Detect Unpublicized Web Services
Detailed
CAPEC-155
Screen Temporary Files for Sensitive Information
Detailed
CAPEC-406
Dumpster Diving
Detailed
CAPEC-637
Collect Data from Clipboard
Detailed
CAPEC-647
Collect Data from Registries
Detailed
CAPEC-648
Collect Data from Screen Capture
Detailed
CAPEC-54
Query System for Information
Standard
CAPEC-127
Directory Indexing
Detailed
CAPEC-215
Fuzzing for application mapping
Detailed
CAPEC-261
Fuzzing for garnering other adjacent user/sensitive data
Detailed
CAPEC-462
Cross-Domain Search Timing
Detailed
CAPEC-95
WSDL Scanning
Detailed
CAPEC-545
Pull Data from System Resources
Standard
CAPEC-498
Probe iOS Screenshots
Detailed
CAPEC-546
Incomplete Data Deletion in a Multi-Tenant Environment
Detailed
CAPEC-634
Probe Audio and Video Peripherals
Detailed
CAPEC-639
Probe System Files
Detailed
CAPEC-569
Collect Data as Provided by Users
Standard
CAPEC-568
Capture Credentials via Keylogger
Detailed
CAPEC-675
Retrieve Data from Decommissioned Devices
Standard
CAPEC-117
Interception
Meta
CAPEC-157
Sniffing Attacks
Standard
CAPEC-158
Sniffing Network Traffic
Detailed
CAPEC-31
Accessing/Intercepting/Modifying HTTP Cookies
Detailed
CAPEC-57
Utilizing REST's Trust in the System Resource to Obtain Sensitive Data
Detailed
CAPEC-609
Cellular Traffic Intercept
Detailed
CAPEC-65
Sniff Application Code
Detailed
CAPEC-499
Android Intent Intercept
Standard
CAPEC-501
Android Activity Hijack
Detailed
CAPEC-651
Eavesdropping
Standard
CAPEC-508
Shoulder Surfing
Detailed
CAPEC-699
Eavesdropping on a Monitor
Meta
CAPEC-12
Choosing Message Identifier
Standard
CAPEC-122
Privilege Abuse
Meta
CAPEC-17
Using Malicious Files
Standard
CAPEC-177
Create files with the same name as files protected with a higher classification
Detailed
CAPEC-263
Force Use of Corrupted Files
Detailed
CAPEC-562
Modify Shared File
Detailed
CAPEC-563
Add Malicious File to Shared Webroot
Detailed
CAPEC-642
Replace Binaries
Detailed
CAPEC-650
Upload a Web Shell to a Web Server
Detailed
CAPEC-180
Exploiting Incorrectly Configured Access Control Security Levels
Standard
CAPEC-702
Exploiting Incorrect Chaining or Granularity of Hardware Debug Components
Detailed
CAPEC-201
Serialized Data External Linking
Detailed
CAPEC-503
WebView Exposure
Standard
CAPEC-123
Buffer Manipulation
Meta
CAPEC-540
Overread Buffers
Standard
CAPEC-124
Shared Resource Manipulation
Meta
CAPEC-125
Flooding
Meta
CAPEC-482
TCP Flood
Standard
CAPEC-486
UDP Flood
Standard
CAPEC-487
ICMP Flood
Standard
CAPEC-488
HTTP Flood
Standard
CAPEC-489
SSL Flood
Standard
CAPEC-490
Amplification
Standard
CAPEC-528
XML Flood
Standard
CAPEC-147
XML Ping of the Death
Detailed
CAPEC-666
BlueSmacking
Standard
CAPEC-126
Path Traversal
Standard
CAPEC-139
Relative Path Traversal
Detailed
CAPEC-597
Absolute Path Traversal
Detailed
CAPEC-76
Manipulating Web Input to File System Calls
Detailed
CAPEC-128
Integer Attacks
Standard
CAPEC-92
Forced Integer Overflow
Detailed
CAPEC-129
Pointer Manipulation
Meta
CAPEC-130
Excessive Allocation
Meta
CAPEC-230
Serialized Data with Nested Payloads
Standard
CAPEC-197
Exponential Data Expansion
Detailed
CAPEC-491
Quadratic Data Expansion
Detailed
CAPEC-231
Oversized Serialized Data Payloads
Standard
CAPEC-221
Data Serialization External Entities Blowup
Detailed
CAPEC-229
Serialized Data Parameter Blowup
Detailed
CAPEC-492
Regular Expression Exponential Blowup
Standard
CAPEC-493
SOAP Array Blowup
Standard
CAPEC-494
TCP Fragmentation
Standard
CAPEC-495
UDP Fragmentation
Standard
CAPEC-496
ICMP Fragmentation
Standard
CAPEC-131
Resource Leak Exposure
Meta
CAPEC-134
Email Injection
Standard
CAPEC-41
Using Meta-characters in E-mail Headers to Inject Malicious Payloads
Detailed
CAPEC-135
Format String Injection
Standard
CAPEC-136
LDAP Injection
Standard
CAPEC-137
Parameter Injection
Meta
CAPEC-138
Reflection Injection
Standard
CAPEC-15
Command Delimiters
Standard
CAPEC-460
HTTP Parameter Pollution (HPP)
Detailed
CAPEC-182
Flash Injection
Standard
CAPEC-174
Flash Parameter Injection
Detailed
CAPEC-178
Cross-Site Flashing
Detailed
CAPEC-6
Argument Injection
Standard
CAPEC-140
Bypassing of Intermediate Forms in Multiple-Form Sets
Standard
CAPEC-141
Cache Poisoning
Standard
CAPEC-142
DNS Cache Poisoning
Detailed
CAPEC-148
Content Spoofing
Meta
CAPEC-145
Checksum Spoofing
Detailed
CAPEC-218
Spoofing of UDDI/ebXML Messages
Detailed
CAPEC-502
Intent Spoof
Standard
CAPEC-627
Counterfeit GPS Signals
Standard
CAPEC-628
Carry-Off GPS Attack
Detailed
CAPEC-151
Identity Spoofing
Meta
CAPEC-194
Fake the Source of Data
Standard
CAPEC-275
DNS Rebinding
Detailed
CAPEC-543
Counterfeit Websites
Detailed
CAPEC-544
Counterfeit Organizations
Detailed
CAPEC-598
DNS Spoofing
Detailed
CAPEC-633
Token Impersonation
Detailed
CAPEC-697
DHCP Spoofing
Standard
CAPEC-195
Principal Spoof
Standard
CAPEC-599
Terrestrial Jamming
Detailed
CAPEC-473
Signature Spoof
Standard
CAPEC-459
Creating a Rogue Certification Authority Certificate
Detailed
CAPEC-474
Signature Spoofing by Key Theft
Detailed
CAPEC-475
Signature Spoofing by Improper Validation
Detailed
CAPEC-476
Signature Spoofing by Misrepresentation
Detailed
CAPEC-477
Signature Spoofing by Mixing Signed and Unsigned Content
Detailed
CAPEC-479
Malicious Root Certificate
Detailed
CAPEC-485
Signature Spoofing by Key Recreation
Detailed
CAPEC-89
Pharming
Standard
CAPEC-98
Phishing
Standard
CAPEC-163
Spear Phishing
Detailed
CAPEC-164
Mobile Phishing
Detailed
CAPEC-656
Voice Phishing
Detailed
CAPEC-153
Input Data Manipulation
Meta
CAPEC-267
Leverage Alternate Encoding
Standard
CAPEC-120
Double Encoding
Detailed
CAPEC-3
Using Leading 'Ghost' Character Sequences to Bypass Input Filters
Detailed
CAPEC-4
Using Alternative IP Address Encodings
Detailed
CAPEC-43
Exploiting Multiple Input Interpretation Layers
Detailed
CAPEC-52
Embedding NULL Bytes
Detailed
CAPEC-53
Postfix, Null Terminate, and Backslash
Detailed
CAPEC-64
Using Slashes and URL Encoding Combined to Bypass Validation Logic
Detailed
CAPEC-71
Using Unicode Encoding to Bypass Validation Logic
Detailed
CAPEC-72
URL Encoding
Detailed
CAPEC-78
Using Escaped Slashes in Alternate Encoding
Detailed
CAPEC-79
Using Slashes in Alternate Encoding
Detailed
CAPEC-80
Using UTF-8 Encoding to Bypass Validation Logic
Detailed
CAPEC-154
Resource Location Spoofing
Meta
CAPEC-159
Redirect Access to Libraries
Standard
CAPEC-132
Symlink Attack
Detailed
CAPEC-38
Leveraging/Manipulating Configuration File Search Paths
Detailed
CAPEC-471
Search Order Hijacking
Detailed
CAPEC-641
DLL Side-Loading
Detailed
CAPEC-616
Establish Rogue Location
Standard
CAPEC-505
Scheme Squatting
Detailed
CAPEC-611
BitSquatting
Detailed
CAPEC-615
Evil Twin Wi-Fi Attack
Detailed
CAPEC-617
Cellular Rogue Base Station
Detailed
CAPEC-630
TypoSquatting
Detailed
CAPEC-631
SoundSquatting
Detailed
CAPEC-632
Homograph Attack via Homoglyphs
Detailed
CAPEC-667
Bluetooth Impersonation AttackS (BIAS)
Detailed
CAPEC-695
Repo Jacking
Detailed
CAPEC-161
Infrastructure Manipulation
Meta
CAPEC-166
Force the System to Reset Values
Standard
CAPEC-268
Audit Log Manipulation
Standard
CAPEC-81
Web Server Logs Tampering
Detailed
CAPEC-93
Log Injection-Tampering-Forging
Detailed
CAPEC-481
Contradictory Destinations in Traffic Routing Schemes
Standard
CAPEC-571
Block Logging to Central Repository
Standard
CAPEC-700
Network Boundary Bridging
Standard
CAPEC-165
File Manipulation
Meta
CAPEC-572
Artificially Inflate File Sizes
Standard
CAPEC-655
Avoid Security Tool Identification by Adding Data
Detailed
CAPEC-635
Alternative Execution Due to Deceptive Filenames
Standard
CAPEC-11
Cause Web Server Misclassification
Detailed
CAPEC-649
Adding a Space to a File Extension
Detailed
CAPEC-636
Hiding Malicious Data or Code within Files
Standard
CAPEC-168
Windows ::DATA Alternate Data Stream
Detailed
CAPEC-35
Leverage Executable Code in Non-Executable Files
Detailed
CAPEC-73
User-Controlled Filename
Standard
CAPEC-167
White Box Reverse Engineering
Standard
CAPEC-190
Reverse Engineer an Executable to Expose Assumed Hidden Functionality
Detailed
CAPEC-191
Read Sensitive Constants Within an Executable
Detailed
CAPEC-204
Lifting Sensitive Data Embedded in Cache
Detailed
CAPEC-37
Retrieve Embedded Sensitive Data
Detailed
CAPEC-169
Footprinting
Meta
CAPEC-292
Host Discovery
Standard
CAPEC-285
ICMP Echo Request Ping
Detailed
CAPEC-294
ICMP Address Mask Request
Detailed
CAPEC-295
Timestamp Request
Detailed
CAPEC-296
ICMP Information Request
Detailed
CAPEC-297
TCP ACK Ping
Detailed
CAPEC-298
UDP Ping
Detailed
CAPEC-299
TCP SYN Ping
Detailed
CAPEC-612
WiFi MAC Address Tracking
Detailed
CAPEC-613
WiFi SSID Tracking
Detailed
CAPEC-618
Cellular Broadcast Message Request
Detailed
CAPEC-619
Signal Strength Tracking
Detailed
CAPEC-300
Port Scanning
Standard
CAPEC-287
TCP SYN Scan
Detailed
CAPEC-301
TCP Connect Scan
Detailed
CAPEC-302
TCP FIN Scan
Detailed
CAPEC-303
TCP Xmas Scan
Detailed
CAPEC-304
TCP Null Scan
Detailed
CAPEC-305
TCP ACK Scan
Detailed
CAPEC-306
TCP Window Scan
Detailed
CAPEC-307
TCP RPC Scan
Detailed
CAPEC-308
UDP Scan
Detailed
CAPEC-309
Network Topology Mapping
Standard
CAPEC-290
Enumerate Mail Exchange (MX) Records
Detailed
CAPEC-291
DNS Zone Transfers
Detailed
CAPEC-293
Traceroute Route Enumeration
Detailed
CAPEC-643
Identify Shared Files/Directories on System
Detailed
CAPEC-497
File Discovery
Standard
CAPEC-149
Explore for Predictable Temporary File Names
Detailed
CAPEC-529
Malware-Directed Internal Reconnaissance
Standard
CAPEC-573
Process Footprinting
Standard
CAPEC-574
Services Footprinting
Standard
CAPEC-575
Account Footprinting
Standard
CAPEC-576
Group Permission Footprinting
Standard
CAPEC-577
Owner Footprinting
Standard
CAPEC-580
System Footprinting
Standard
CAPEC-581
Security Software Footprinting
Detailed
CAPEC-85
AJAX Footprinting
Detailed
CAPEC-646
Peripheral Footprinting
Standard
CAPEC-694
System Location Discovery
Standard
CAPEC-171
DEPRECATED: Variable Manipulation
Meta
CAPEC-173
Action Spoofing
Meta
CAPEC-504
Task Impersonation
Standard
CAPEC-654
Credential Prompt Impersonation
Detailed
CAPEC-506
Tapjacking
Standard
CAPEC-175
Code Inclusion
Meta
CAPEC-251
Local Code Inclusion
Standard
CAPEC-252
PHP Local File Inclusion
Detailed
CAPEC-640
Inclusion of Code in Existing Process
Detailed
CAPEC-660
Root/Jailbreak Detection Evasion via Hooking
Detailed
CAPEC-253
Remote Code Inclusion
Standard
CAPEC-101
Server Side Include (SSI) Injection
Detailed
CAPEC-193
PHP Remote File Inclusion
Detailed
CAPEC-500
WebView Injection
Detailed
CAPEC-176
Configuration/Environment Manipulation
Meta
CAPEC-203
Manipulate Registry Information
Standard
CAPEC-270
Modification of Registry Run Keys
Detailed
CAPEC-478
Modification of Windows Service Configuration
Detailed
CAPEC-51
Poison Web Service Registry
Detailed
CAPEC-271
Schema Poisoning
Standard
CAPEC-146
XML Schema Poisoning
Detailed
CAPEC-536
Data Injected During Configuration
Standard
CAPEC-578
Disable Security Software
Standard
CAPEC-75
Manipulating Writeable Configuration Files
Standard
CAPEC-179
Calling Micro-Services Directly
Standard
CAPEC-183
IMAP/SMTP Command Injection
Standard
CAPEC-184
Software Integrity Attack
Meta
CAPEC-185
Malicious Software Download
Standard
CAPEC-186
Malicious Software Update
Standard
CAPEC-187
Malicious Automated Software Update via Redirection
Detailed
CAPEC-533
Malicious Manual Software Update
Detailed
CAPEC-614
Rooting SIM Cards
Detailed
CAPEC-657
Malicious Automated Software Update via Spoofing
Detailed
CAPEC-663
Exploitation of Transient Instruction Execution
Standard
CAPEC-696
Load Value Injection
Detailed
CAPEC-669
Alteration of a Software Update
Standard
CAPEC-188
Reverse Engineering
Meta
CAPEC-189
Black Box Reverse Engineering
Standard
CAPEC-621
Analysis of Packet Timing and Sizes
Detailed
CAPEC-622
Electromagnetic Side-Channel Attack
Detailed
CAPEC-623
Compromising Emanations Attack
Detailed
CAPEC-19
Embedding Scripts within Scripts
Standard
CAPEC-192
Protocol Analysis
Meta
CAPEC-97
Cryptanalysis
Standard
CAPEC-463
Padding Oracle Crypto Attack
Detailed
CAPEC-608
Cryptanalysis of Cellular Encryption
Detailed
CAPEC-196
Session Credential Falsification through Forging
Standard
CAPEC-226
Session Credential Falsification through Manipulation
Detailed
CAPEC-59
Session Credential Falsification through Prediction
Detailed
CAPEC-2
Inducing Account Lockout
Standard
CAPEC-202
Create Malicious Client
Standard
CAPEC-205
DEPRECATED: Lifting credential(s)/key material embedded in client distributions (thick or thin)
Detailed
CAPEC-207
Removing Important Client Functionality
Standard
CAPEC-200
Removal of filters: Input filters, output filters, data masking
Detailed
CAPEC-208
Removing/short-circuiting 'Purse' logic: removing/mutating 'cash' decrements
Detailed
CAPEC-21
Exploitation of Trusted Identifiers
Meta
CAPEC-510
SaaS User Request Forgery
Standard
CAPEC-593
Session Hijacking
Standard
CAPEC-102
Session Sidejacking
Detailed
CAPEC-107
Cross Site Tracing
Detailed
CAPEC-60
Reusing Session IDs (aka Session Replay)
Detailed
CAPEC-61
Session Fixation
Detailed
CAPEC-62
Cross Site Request Forgery
Standard
CAPEC-467
Cross Site Identification
Detailed
CAPEC-211
DEPRECATED: Leveraging web tools (e.g. Mozilla's GreaseMonkey, Firebug) to change application behavior
Detailed
CAPEC-212
Functionality Misuse
Meta
CAPEC-48
Passing Local Filenames to Functions That Expect a URL
Standard
CAPEC-50
Password Recovery Exploitation
Standard
CAPEC-620
Drop Encryption Level
Standard
CAPEC-606
Weakening of Cellular Encryption
Detailed
CAPEC-682
Exploitation of Firmware or ROM Code with Unpatchable Vulnerabilities
Standard
CAPEC-213
DEPRECATED: Directory Traversal
Standard
CAPEC-214
DEPRECATED: Fuzzing for garnering J2EE/.NET-based stack traces, for application mapping
Detailed
CAPEC-216
Communication Channel Manipulation
Meta
CAPEC-217
Exploiting Incorrectly Configured SSL/TLS
Standard
CAPEC-219
XML Routing Detour Attacks
Standard
CAPEC-22
Exploiting Trust in Client
Meta
CAPEC-39
Manipulating Opaque Client-based Data Tokens
Standard
CAPEC-77
Manipulating User-Controlled Variables
Standard
CAPEC-13
Subverting Environment Variable Values
Detailed
CAPEC-162
Manipulating Hidden Fields
Detailed
CAPEC-220
Client-Server Protocol Manipulation
Standard
CAPEC-105
HTTP Request Splitting
Detailed
CAPEC-273
HTTP Response Smuggling
Detailed
CAPEC-274
HTTP Verb Tampering
Detailed
CAPEC-33
HTTP Request Smuggling
Detailed
CAPEC-34
HTTP Response Splitting
Detailed
CAPEC-5
Blue Boxing
Detailed
CAPEC-224
Fingerprinting
Meta
CAPEC-312
Active OS Fingerprinting
Standard
CAPEC-317
IP ID Sequencing Probe
Detailed
CAPEC-318
IP 'ID' Echoed Byte-Order Probe
Detailed
CAPEC-319
IP (DF) 'Don't Fragment Bit' Echoing Probe
Detailed
CAPEC-320
TCP Timestamp Probe
Detailed
CAPEC-321
TCP Sequence Number Probe
Detailed
CAPEC-322
TCP (ISN) Greatest Common Divisor Probe
Detailed
CAPEC-323
TCP (ISN) Counter Rate Probe
Detailed
CAPEC-324
TCP (ISN) Sequence Predictability Probe
Detailed
CAPEC-325
TCP Congestion Control Flag (ECN) Probe
Detailed
CAPEC-326
TCP Initial Window Size Probe
Detailed
CAPEC-327
TCP Options Probe
Detailed
CAPEC-328
TCP 'RST' Flag Checksum Probe
Detailed
CAPEC-329
ICMP Error Message Quoting Probe
Detailed
CAPEC-330
ICMP Error Message Echoing Integrity Probe
Detailed
CAPEC-331
ICMP IP Total Length Field Probe
Detailed
CAPEC-332
ICMP IP 'ID' Field Error Message Probe
Detailed
CAPEC-313
Passive OS Fingerprinting
Standard
CAPEC-541
Application Fingerprinting
Standard
CAPEC-170
Web Application Fingerprinting
Detailed
CAPEC-310
Scanning for Vulnerable Software
Detailed
CAPEC-472
Browser Fingerprinting
Detailed
CAPEC-227
Sustained Client Engagement
Meta
CAPEC-469
HTTP DoS
Standard
CAPEC-23
File Content Injection
Standard
CAPEC-233
Privilege Escalation
Meta
CAPEC-234
Hijacking a privileged process
Standard
CAPEC-30
Hijacking a Privileged Thread of Execution
Standard
CAPEC-68
Subvert Code-signing Facilities
Standard
CAPEC-69
Target Programs with Elevated Privileges
Standard
CAPEC-235
DEPRECATED: Implementing a callback to system routine (old AWT Queue)
Detailed
CAPEC-236
DEPRECATED: Catching exception throw/signal from privileged block
Detailed
CAPEC-238
DEPRECATED: Using URL/codebase / G.A.C. (code source) to convince sandbox of privilege
Detailed
CAPEC-239
DEPRECATED: Subversion of Authorization Checks: Cache Filtering, Programmatic Security, etc.
Detailed
CAPEC-240
Resource Injection
Meta
CAPEC-610
Cellular Data Injection
Standard
CAPEC-241
DEPRECATED: Code Injection
Meta
CAPEC-242
Code Injection
Meta
CAPEC-468
Generic Cross-Browser Cross-Domain Theft
Standard
CAPEC-63
Cross-Site Scripting (XSS)
Standard
CAPEC-588
DOM-Based XSS
Detailed
CAPEC-18
XSS Targeting Non-Script Elements
Detailed
CAPEC-198
XSS Targeting Error Pages
Detailed
CAPEC-199
XSS Using Alternate Syntax
Detailed
CAPEC-243
XSS Targeting HTML Attributes
Detailed
CAPEC-244
XSS Targeting URI Placeholders
Detailed
CAPEC-245
XSS Using Doubled Characters
Detailed
CAPEC-247
XSS Using Invalid Characters
Detailed
CAPEC-32
XSS Through HTTP Query Strings
Detailed
CAPEC-86
XSS Through HTTP Headers
Detailed
CAPEC-591
Reflected XSS
Detailed
CAPEC-592
Stored XSS
Detailed
CAPEC-209
XSS Using MIME Type Mismatch
Detailed
CAPEC-246
DEPRECATED: XSS Using Flash
Detailed
CAPEC-248
Command Injection
Meta
CAPEC-250
XML Injection
Standard
CAPEC-228
DTD Injection
Detailed
CAPEC-83
XPath Injection
Detailed
CAPEC-84
XQuery Injection
Detailed
CAPEC-40
Manipulating Writeable Terminal Devices
Standard
CAPEC-66
SQL Injection
Standard
CAPEC-108
Command Line Execution through SQL Injection
Detailed
CAPEC-109
Object Relational Mapping Injection
Detailed
CAPEC-110
SQL Injection through SOAP Parameter Tampering
Detailed
CAPEC-470
Expanding Control over the Operating System from the Database
Detailed
CAPEC-7
Blind SQL Injection
Detailed
CAPEC-676
NoSQL Injection
Standard
CAPEC-88
OS Command Injection
Standard
CAPEC-249
DEPRECATED: Linux Terminal Injection
Standard
CAPEC-25
Forced Deadlock
Meta
CAPEC-254
DEPRECATED: DTD Injection in a SOAP Message
Detailed
CAPEC-257
DEPRECATED: Abuse of Transaction Data Structure
Meta
CAPEC-258
DEPRECATED: Passively Sniffing and Capturing Application Code Bound for an Authorized Client During Dynamic Update
Detailed
CAPEC-259
DEPRECATED: Passively Sniffing and Capturing Application Code Bound for an Authorized Client During Patching
Standard
CAPEC-26
Leveraging Race Conditions
Meta
CAPEC-29
Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
Standard
CAPEC-27
Leveraging Race Conditions via Symbolic Links
Detailed
CAPEC-260
DEPRECATED: Passively Sniffing and Capturing Application Code Bound for an Authorized Client During Initial Distribution
Detailed
CAPEC-264
DEPRECATED: Environment Variable Manipulation
Meta
CAPEC-265
DEPRECATED: Global variable manipulation
Meta
CAPEC-266
DEPRECATED: Manipulate Canonicalization
Meta
CAPEC-269
DEPRECATED: Registry Manipulation
Meta
CAPEC-272
Protocol Manipulation
Meta
CAPEC-276
Inter-component Protocol Manipulation
Standard
CAPEC-665
Exploitation of Thunderbolt Protection Flaws
Detailed
CAPEC-277
Data Interchange Protocol Manipulation
Standard
CAPEC-278
Web Services Protocol Manipulation
Standard
CAPEC-279
SOAP Manipulation
Detailed
CAPEC-28
Fuzzing
Meta
CAPEC-280
DEPRECATED: SOAP Parameter Tampering
Detailed
CAPEC-288
DEPRECATED: ICMP Echo Request Ping
Meta
CAPEC-289
DEPRECATED: Infrastructure-based footprinting
Meta
CAPEC-311
DEPRECATED: OS Fingerprinting
Standard
CAPEC-314
DEPRECATED: IP Fingerprinting Probes
Standard
CAPEC-315
DEPRECATED: TCP/IP Fingerprinting Probes
Standard
CAPEC-316
DEPRECATED: ICMP Fingerprinting Probes
Standard
CAPEC-384
Application API Message Manipulation via Man-in-the-Middle
Standard
CAPEC-385
Transaction or Event Tampering via Application API Manipulation
Detailed
CAPEC-389
Content Spoofing Via Application API Manipulation
Detailed
CAPEC-386
Application API Navigation Remapping
Standard
CAPEC-387
Navigation Remapping To Propagate Malicious Content
Detailed
CAPEC-388
Application API Button Hijacking
Detailed
CAPEC-390
Bypassing Physical Security
Meta
CAPEC-391
Bypassing Physical Locks
Standard
CAPEC-392
Lock Bumping
Detailed
CAPEC-393
Lock Picking
Detailed
CAPEC-394
Using a Snap Gun Lock to Force a Lock
Detailed
CAPEC-395
Bypassing Electronic Locks and Access Controls
Standard
CAPEC-397
Cloning Magnetic Strip Cards
Detailed
CAPEC-398
Magnetic Strip Card Brute Force Attacks
Detailed
CAPEC-399
Cloning RFID Cards or Chips
Detailed
CAPEC-400
RFID Chip Deactivation or Destruction
Detailed
CAPEC-626
Smudge Attack
Detailed
CAPEC-396
DEPRECATED: Bypassing Card or Badge-Based Systems
Standard
CAPEC-401
Physically Hacking Hardware
Standard
CAPEC-402
Bypassing ATA Password Security
Detailed
CAPEC-404
DEPRECATED: Social Information Gathering Attacks
Meta
CAPEC-405
DEPRECATED: Social Information Gathering via Research
Meta
CAPEC-407
Pretexting
Standard
CAPEC-383
Harvesting Information via API Event Monitoring
Detailed
CAPEC-412
Pretexting via Customer Service
Detailed
CAPEC-413
Pretexting via Tech Support
Detailed
CAPEC-414
Pretexting via Delivery Person
Detailed
CAPEC-415
Pretexting via Phone
Detailed
CAPEC-408
DEPRECATED: Information Gathering from Traditional Sources
Meta
CAPEC-409
DEPRECATED: Information Gathering from Non-Traditional Sources
Meta
CAPEC-410
Information Elicitation
Meta
CAPEC-411
DEPRECATED: Pretexting
Meta
CAPEC-416
Manipulate Human Behavior
Meta
CAPEC-417
Influence Perception
Standard
CAPEC-418
Influence Perception of Reciprocation
Detailed
CAPEC-420
Influence Perception of Scarcity
Detailed
CAPEC-421
Influence Perception of Authority
Detailed
CAPEC-422
Influence Perception of Commitment and Consistency
Detailed
CAPEC-423
Influence Perception of Liking
Detailed
CAPEC-424
Influence Perception of Consensus or Social Proof
Detailed
CAPEC-425
Target Influence via Framing
Standard
CAPEC-426
Influence via Incentives
Standard
CAPEC-427
Influence via Psychological Principles
Standard
CAPEC-428
Influence via Modes of Thinking
Detailed
CAPEC-429
Target Influence via Eye Cues
Detailed
CAPEC-433
Target Influence via The Human Buffer Overflow
Detailed
CAPEC-434
Target Influence via Interview and Interrogation
Detailed
CAPEC-435
Target Influence via Instant Rapport
Detailed
CAPEC-419
DEPRECATED: Target Influence via Perception of Concession
Meta
CAPEC-430
DEPRECATED: Target Influence via Micro-Expressions
Detailed
CAPEC-431
DEPRECATED: Target Influence via Neuro-Linguistic Programming (NLP)
Detailed
CAPEC-432
DEPRECATED: Target Influence via Voice in NLP
Detailed
CAPEC-438
Modification During Manufacture
Meta
CAPEC-444
Development Alteration
Standard
CAPEC-206
Signing Malicious Code
Detailed
CAPEC-443
Malicious Logic Inserted Into Product by Authorized Developer
Detailed
CAPEC-445
Malicious Logic Insertion into Product Software via Configuration Management Manipulation
Detailed
CAPEC-446
Malicious Logic Insertion into Product via Inclusion of Third-Party Component
Detailed
CAPEC-511
Infiltration of Software Development Environment
Detailed
CAPEC-516
Hardware Component Substitution During Baselining
Detailed
CAPEC-520
Counterfeit Hardware Component Inserted During Product Assembly
Detailed
CAPEC-532
Altered Installed BIOS
Detailed
CAPEC-537
Infiltration of Hardware Development Environment
Detailed
CAPEC-538
Open-Source Library Manipulation
Detailed
CAPEC-539
ASIC With Malicious Functionality
Detailed
CAPEC-670
Software Development Tools Maliciously Altered
Detailed
CAPEC-672
Malicious Code Implanted During Chip Programming
Detailed
CAPEC-673
Developer Signing Maliciously Altered Software
Detailed
CAPEC-678
System Build Data Maliciously Altered
Detailed
CAPEC-447
Design Alteration
Standard
CAPEC-517
Documentation Alteration to Circumvent Dial-down
Detailed
CAPEC-518
Documentation Alteration to Produce Under-performing Systems
Detailed
CAPEC-519
Documentation Alteration to Cause Errors in System Design
Detailed
CAPEC-521
Hardware Design Specifications Are Altered
Detailed
CAPEC-671
Requirements for ASIC Functionality Maliciously Altered
Detailed
CAPEC-674
Design for FPGA Maliciously Altered
Detailed
CAPEC-439
Manipulation During Distribution
Meta
CAPEC-522
Malicious Hardware Component Replacement
Standard
CAPEC-523
Malicious Software Implanted
Standard
CAPEC-524
Rogue Integration Procedures
Standard
CAPEC-440
Hardware Integrity Attack
Meta
CAPEC-534
Malicious Hardware Update
Standard
CAPEC-531
Hardware Component Substitution
Detailed
CAPEC-530
Provide Counterfeit Component
Detailed
CAPEC-535
Malicious Gray Market Hardware
Detailed
CAPEC-677
Server Motherboard Compromise
Detailed
CAPEC-441
Malicious Logic Insertion
Meta
CAPEC-442
Infected Software
Standard
CAPEC-448
Embed Virus into DLL
Detailed
CAPEC-452
Infected Hardware
Standard
CAPEC-638
Altered Component Firmware
Detailed
CAPEC-456
Infected Memory
Standard
CAPEC-457
USB Memory Attacks
Detailed
CAPEC-458
Flash Memory Attacks
Detailed
CAPEC-449
DEPRECATED: Malware Propagation via USB Stick
Detailed
CAPEC-450
DEPRECATED: Malware Propagation via USB U3 Autorun
Standard
CAPEC-451
DEPRECATED: Malware Propagation via Infected Peripheral Device
Detailed
CAPEC-453
DEPRECATED: Malicious Logic Insertion via Counterfeit Hardware
Standard
CAPEC-454
DEPRECATED: Modification of Existing Components with Counterfeit Hardware
Detailed
CAPEC-455
DEPRECATED: Malicious Logic Insertion via Inclusion of Counterfeit Hardware Components
Detailed
CAPEC-464
Evercookie
Standard
CAPEC-465
Transparent Proxy Abuse
Standard
CAPEC-466
Leveraging Active Adversary in the Middle Attacks to Bypass Same Origin Policy
Standard
CAPEC-484
DEPRECATED: XML Client-Side Attack
Standard
CAPEC-507
Physical Theft
Meta
CAPEC-542
Targeted Malware
Standard
CAPEC-550
Install New Service
Detailed
CAPEC-551
Modify Existing Service
Detailed
CAPEC-552
Install Rootkit
Detailed
CAPEC-556
Replace File Extension Handlers
Detailed
CAPEC-558
Replace Trusted Executable
Detailed
CAPEC-564
Run Software at Logon
Detailed
CAPEC-579
Replace Winlogon Helper DLL
Detailed
CAPEC-698
Install Malicious Extension
Detailed
CAPEC-547
Physical Destruction of Device or Component
Standard
CAPEC-548
Contaminate Resource
Meta
CAPEC-549
Local Execution of Code
Meta
CAPEC-554
Functionality Bypass
Meta
CAPEC-555
Remote Services with Stolen Credentials
Standard
CAPEC-557
DEPRECATED: Schedule Software To Run
Detailed
CAPEC-56
DEPRECATED: Removing/short-circuiting 'guard logic'
Standard
CAPEC-560
Use of Known Domain Credentials
Meta
CAPEC-600
Credential Stuffing
Standard
CAPEC-652
Use of Known Kerberos Credentials
Standard
CAPEC-509
Kerberoasting
Detailed
CAPEC-645
Use of Captured Tickets (Pass The Ticket)
Detailed
CAPEC-653
Use of Known Operating System Credentials
Standard
CAPEC-561
Windows Admin Shares with Stolen Credentials
Detailed
CAPEC-644
Use of Captured Hashes (Pass The Hash)
Detailed
CAPEC-566
DEPRECATED: Dump Password Hashes
Detailed
CAPEC-567
DEPRECATED: Obtain Data via Utilities
Standard
CAPEC-570
DEPRECATED: Signature-Based Avoidance
Detailed
CAPEC-582
Route Disabling
Standard
CAPEC-583
Disabling Network Hardware
Detailed
CAPEC-584
BGP Route Disabling
Detailed
CAPEC-585
DNS Domain Seizure
Detailed
CAPEC-586
Object Injection
Meta
CAPEC-594
Traffic Injection
Meta
CAPEC-595
Connection Reset
Standard
CAPEC-596
TCP RST Injection
Detailed
CAPEC-601
Jamming
Standard
CAPEC-559
Orbital Jamming
Detailed
CAPEC-604
Wi-Fi Jamming
Detailed
CAPEC-605
Cellular Jamming
Detailed
CAPEC-602
DEPRECATED: Degradation
Meta
CAPEC-603
Blockage
Standard
CAPEC-589
DNS Blocking
Detailed
CAPEC-590
IP Address Blocking
Detailed
CAPEC-96
Block Access to Libraries
Detailed
CAPEC-607
Obstruction
Meta
CAPEC-624
Hardware Fault Injection
Meta
CAPEC-625
Mobile Device Fault Injection
Standard
CAPEC-629
DEPRECATED: Unauthorized Use of Device Resources
Standard
CAPEC-662
Adversary in the Browser (AiTB)
Standard
CAPEC-690
Metadata Spoofing
Meta
CAPEC-691
Spoof Open-Source Software Metadata
Standard
CAPEC-692
Spoof Version Control System Commit Metadata
Detailed
CAPEC-693
StarJacking
Detailed
CAPEC-701
Browser in the Middle (BiTM)
Standard
CAPEC-74
Manipulating State
Meta
CAPEC-82
DEPRECATED: Violating Implicit Assumptions Regarding XML Content (aka XML Denial of Service (XDoS))
Standard
CAPEC-91
DEPRECATED: XSS in IMG Tags
Detailed
CAPEC-94
Adversary in the Middle (AiTM)
Meta
CAPEC-99
DEPRECATED: XML Parser Attack
Standard