New Patterns Added |
---|
CAPEC-383 | Harvesting Usernames or UserIDs via Application API Event Monitoring |
CAPEC-384 | Application API Message Manipulation via Man-in-the-Middle |
CAPEC-385 | Transaction or Event Tampering via Application API Manipulation |
CAPEC-386 | Application API Navigation Remapping |
CAPEC-387 | Navigation Remapping To Propagate Malicoius Content |
CAPEC-388 | Application API Button Hijacking |
CAPEC-389 | Content Spoofing Via Application API Manipulation |
CAPEC-390 | Bypassing Physical Security of Systems or Facilities |
CAPEC-391 | Bypassing Physical Locks |
CAPEC-392 | Lock Bumping |
CAPEC-393 | Lock Picking |
CAPEC-394 | Using a Snap Gun Lock to Force a Lock |
CAPEC-395 | Bypassing Electronic Locks and Access Controls |
CAPEC-396 | Bypassing Card or Badge-Based Systems |
CAPEC-397 | Cloning Magnetic Strip Cards |
CAPEC-398 | Magnetic Strip Card Brute Force Attacks |
CAPEC-399 | Cloning RFID Cards or Chips |
CAPEC-400 | RFID Chip Deactivation or Destruction |
CAPEC-401 | Hacking Hardware Devices or Components |
CAPEC-402 | Bypassing ATA Password Security |
CAPEC-403 | Social Engineering Attacks |
CAPEC-404 | Social Information Gathering Attacks |
CAPEC-405 | Social Information Gathering via Research |
CAPEC-406 | Social Information Gathering via Dumpster Diving |
CAPEC-407 | Social Information Gathering via Pretexting |
CAPEC-408 | Information Gathering from Traditional Sources |
CAPEC-409 | Information Gathering from Non-Traditional Sources |
CAPEC-410 | Information Elicitation via Social Engineering |
CAPEC-411 | Pretexting |
CAPEC-412 | Pretexting via Customer Service |
CAPEC-413 | Pretexting via Tech Support |
CAPEC-414 | Pretexting via Delivery Person |
CAPEC-415 | Pretexting via Phone |
CAPEC-416 | Target Influence via Social Engineering |
CAPEC-417 | Target Influence via Perception of Reciprocation |
CAPEC-418 | Target Influence via Perception of Obligation |
CAPEC-419 | Target Influence via Perception of Concession |
CAPEC-420 | Target Influence via Perception of Scarcity |
CAPEC-421 | Target Influence via Perception of Authority |
CAPEC-422 | Target Influence via Perception of Commitment and Consistency |
CAPEC-423 | Target Influence via Perception of Liking |
CAPEC-424 | Target Influence via Perception of Consensus or Social Proof |
CAPEC-425 | Target Influence via Framing |
CAPEC-426 | Target Influence via Manipulation of Incentives |
CAPEC-427 | Target Influence via Psychological Principles |
CAPEC-428 | Target Influence via Modes of Thinking |
CAPEC-429 | Target Influence via Eye Cues |
CAPEC-430 | Target Influence via Micro-Expressions |
CAPEC-431 | Target Influence via Neuro-Linguistic Programming (NLP) |
CAPEC-432 | Target Influence via Voice in NLP |
CAPEC-433 | Target Influence via The Human Buffer Overflow |
CAPEC-434 | Target Influence via Interview and Interrogation |
CAPEC-435 | Target Influence via Instant Rapport |
CAPEC-437 | Supply Chain Attacks |
CAPEC-438 | Integrity Modification/Manipulation During Manufacture |
CAPEC-439 | Integrity Modification during Distribution |
CAPEC-440 | Integrity Modification During Deployed Use |
CAPEC-441 | Malicious Logic Inserted Into Product |
CAPEC-442 | Malicious Logic Inserted Into Product Software |
CAPEC-443 | Malicious Logic Inserted Into Product Software by Authorized Developer |
CAPEC-444 | Malicious Logic Insertion into Product Software via Externally Manipulated Component |
CAPEC-445 | Malicious Logic Insertion into Product Software via Configuration Management Manipulation |
CAPEC-446 | Malicious Logic Insertion into Product Software via Inclusion of 3rd Party Component Dependency |
CAPEC-447 | Malicious Logic Insertion into Product Software during Update |
CAPEC-448 | Malware Infection into Product Software |
CAPEC-449 | Malware Propagation via USB Stick |
CAPEC-450 | Malware Propagation via USB U3 Autorun |
CAPEC-451 | Malware Propagation via Infected Peripheral Device |
CAPEC-452 | Malicious Logic Insertion into Product Hardware |
CAPEC-453 | Malicious Logic Insertion via Counterfeit Hardware |
CAPEC-454 | Modification of Existing Components with Counterfeit Hardware |
CAPEC-455 | Malicious Logic Insertion via Inclusion of Counterfeit Hardware Components |
CAPEC-456 | Malicious Logic Insertion into Product Memory |
CAPEC-457 | USB Memory Attacks |
CAPEC-458 | Flash Memory Attacks |
CAPEC --> CWE Mappings Added |
---|
CAPEC-383 Harvesting Usernames or UserIDs via Application API Event Monitoring |
--> | CWE-311 | Missing Encryption of Sensitive Data |
--> | CWE-319 | Cleartext Transmission of Sensitive Information |
--> | CWE-419 | Unprotected Primary Channel |
--> | CWE-602 | Client-Side Enforcement of Server-Side Security |
CAPEC-384 Application API Message Manipulation via Man-in-the-Middle |
--> | CWE-311 | Missing Encryption of Sensitive Data |
--> | CWE-345 | Insufficient Verification of Data Authenticity |
--> | CWE-346 | Origin Validation Error |
--> | CWE-471 | Modification of Assumed-Immutable Data (MAID) |
--> | CWE-602 | Client-Side Enforcement of Server-Side Security |
CAPEC-385 Transaction or Event Tampering via Application API Manipulation |
--> | CWE-311 | Missing Encryption of Sensitive Data |
--> | CWE-345 | Insufficient Verification of Data Authenticity |
--> | CWE-346 | Origin Validation Error |
--> | CWE-471 | Modification of Assumed-Immutable Data (MAID) |
--> | CWE-602 | Client-Side Enforcement of Server-Side Security |
CAPEC-386 Application API Navigation Remapping |
--> | CWE-311 | Missing Encryption of Sensitive Data |
--> | CWE-345 | Insufficient Verification of Data Authenticity |
--> | CWE-346 | Origin Validation Error |
--> | CWE-471 | Modification of Assumed-Immutable Data (MAID) |
--> | CWE-602 | Client-Side Enforcement of Server-Side Security |
CAPEC-387 Navigation Remapping To Propagate Malicoius Content |
--> | CWE-311 | Missing Encryption of Sensitive Data |
--> | CWE-345 | Insufficient Verification of Data Authenticity |
--> | CWE-346 | Origin Validation Error |
--> | CWE-471 | Modification of Assumed-Immutable Data (MAID) |
--> | CWE-602 | Client-Side Enforcement of Server-Side Security |
CAPEC-388 Application API Button Hijacking |
--> | CWE-311 | Missing Encryption of Sensitive Data |
--> | CWE-345 | Insufficient Verification of Data Authenticity |
--> | CWE-346 | Origin Validation Error |
--> | CWE-471 | Modification of Assumed-Immutable Data (MAID) |
--> | CWE-602 | Client-Side Enforcement of Server-Side Security |
CAPEC-389 Content Spoofing Via Application API Manipulation |
--> | CWE-311 | Missing Encryption of Sensitive Data |
--> | CWE-345 | Insufficient Verification of Data Authenticity |
--> | CWE-346 | Origin Validation Error |
--> | CWE-602 | Client-Side Enforcement of Server-Side Security |