Home > CAPEC List > CAPEC-282: Meta Abstractions (Version 2.10)  

CAPEC VIEW: Meta Abstractions

 
Meta Abstractions
Definition in a New Window Definition in a New Window
View ID: 282
Structure: Implicit Slice
Status: Draft
+ View Objective

This view (slice) covers meta abstraction attack patterns.

+ Relationships
Meta Attack PatternMeta Attack Pattern Action Spoofing - (173)
Meta Attack PatternMeta Attack Pattern API Manipulation - (113)
Meta Attack PatternMeta Attack Pattern Application API Message Manipulation via Man-in-the-Middle - (384)
Meta Attack PatternMeta Attack Pattern Authentication Abuse - (114)
Meta Attack PatternMeta Attack Pattern Authentication Bypass - (115)
Meta Attack PatternMeta Attack Pattern Brute Force - (112)
Meta Attack PatternMeta Attack Pattern Buffer Manipulation - (123)
Meta Attack PatternMeta Attack Pattern Bypassing Physical Locks - (391)
Meta Attack PatternMeta Attack Pattern Bypassing Physical Security - (390)
Meta Attack PatternMeta Attack Pattern Code Inclusion - (175)
Meta Attack PatternMeta Attack Pattern Code Injection - (242)
Meta Attack PatternMeta Attack Pattern Command Injection - (248)
Meta Attack PatternMeta Attack Pattern Communication Channel Manipulation - (216)
Meta Attack PatternMeta Attack Pattern Configuration/Environment Manipulation - (176)
Meta Attack PatternMeta Attack Pattern Contaminate Resource - (548)
Meta Attack PatternMeta Attack Pattern Content Spoofing - (148)
DeprecatedDeprecated DEPRECATED: Abuse of Transaction Data Structure - (257)
DeprecatedDeprecated DEPRECATED: Code Injection - (241)
DeprecatedDeprecated DEPRECATED: Degradation - (602)
DeprecatedDeprecated DEPRECATED: Environment Variable Manipulation - (264)
DeprecatedDeprecated DEPRECATED: Global variable manipulation - (265)
DeprecatedDeprecated DEPRECATED: ICMP Echo Request Ping - (288)
DeprecatedDeprecated DEPRECATED: Infrastructure-based footprinting - (289)
DeprecatedDeprecated DEPRECATED: Manipulate Canonicalization - (266)
DeprecatedDeprecated DEPRECATED: Pretexting - (411)
DeprecatedDeprecated DEPRECATED: Registry Manipulation - (269)
DeprecatedDeprecated DEPRECATED: Variable Manipulation - (171)
Meta Attack PatternMeta Attack Pattern Excavation - (116)
Meta Attack PatternMeta Attack Pattern Excessive Allocation - (130)
Meta Attack PatternMeta Attack Pattern Exploitation of Trusted Credentials - (21)
Meta Attack PatternMeta Attack Pattern Exploiting Trust in Client - (22)
Meta Attack PatternMeta Attack Pattern Fault Injection - (624)
Meta Attack PatternMeta Attack Pattern File Manipulation - (165)
Meta Attack PatternMeta Attack Pattern Fingerprinting - (224)
Meta Attack PatternMeta Attack Pattern Flooding - (125)
Meta Attack PatternMeta Attack Pattern Footprinting - (169)
Meta Attack PatternMeta Attack Pattern Forced Deadlock - (25)
Meta Attack PatternMeta Attack Pattern Functionality Bypass - (554)
Meta Attack PatternMeta Attack Pattern Functionality Misuse - (212)
Meta Attack PatternMeta Attack Pattern Fuzzing - (28)
Meta Attack PatternMeta Attack Pattern Hardware Integrity Attack - (440)
Meta Attack PatternMeta Attack Pattern Identity Spoofing - (151)
Meta Attack PatternMeta Attack Pattern Information Elicitation via Social Engineering - (410)
Meta Attack PatternMeta Attack Pattern Information Gathering from Non-Traditional Sources - (409)
Meta Attack PatternMeta Attack Pattern Information Gathering from Traditional Sources - (408)
Meta Attack PatternMeta Attack Pattern Infrastructure Manipulation - (161)
Meta Attack PatternMeta Attack Pattern Input Data Manipulation - (153)
Meta Attack PatternMeta Attack Pattern Interception - (117)
Meta Attack PatternMeta Attack Pattern Leveraging Active Man in the Middle Attacks to Bypass Same Origin Policy - (466)
Meta Attack PatternMeta Attack Pattern Leveraging Race Conditions - (26)
Meta Attack PatternMeta Attack Pattern Local Execution of Code - (549)
Meta Attack PatternMeta Attack Pattern Lock Bumping - (392)
Meta Attack PatternMeta Attack Pattern Malicious Logic Insertion - (441)
Meta Attack PatternMeta Attack Pattern Manipulating User State - (74)
Meta Attack PatternMeta Attack Pattern Manipulation During Distribution - (439)
Meta Attack PatternMeta Attack Pattern Modification During Manufacture - (438)
Meta Attack PatternMeta Attack Pattern Object Injection - (586)
Meta Attack PatternMeta Attack Pattern Obstruction - (607)
Meta Attack PatternMeta Attack Pattern Parameter Injection - (137)
Meta Attack PatternMeta Attack Pattern Physical Theft - (507)
Meta Attack PatternMeta Attack Pattern Pointer Manipulation - (129)
Meta Attack PatternMeta Attack Pattern Pretexting via Customer Service - (412)
Meta Attack PatternMeta Attack Pattern Pretexting via Delivery Person - (414)
Meta Attack PatternMeta Attack Pattern Pretexting via Phone - (415)
Meta Attack PatternMeta Attack Pattern Pretexting via Tech Support - (413)
Meta Attack PatternMeta Attack Pattern Privilege Abuse - (122)
Meta Attack PatternMeta Attack Pattern Privilege Escalation - (233)
Meta Attack PatternMeta Attack Pattern Protocol Analysis - (192)
Meta Attack PatternMeta Attack Pattern Protocol Manipulation - (272)
Meta Attack PatternMeta Attack Pattern Resource Injection - (240)
Meta Attack PatternMeta Attack Pattern Resource Leak Exposure - (131)
Meta Attack PatternMeta Attack Pattern Resource Location Spoofing - (154)
Meta Attack PatternMeta Attack Pattern Reverse Engineering - (188)
Meta Attack PatternMeta Attack Pattern Shared Data Manipulation - (124)
Meta Attack PatternMeta Attack Pattern Social Information Gathering Attacks - (404)
Meta Attack PatternMeta Attack Pattern Social Information Gathering via Dumpster Diving - (406)
Meta Attack PatternMeta Attack Pattern Social Information Gathering via Pretexting - (407)
Meta Attack PatternMeta Attack Pattern Social Information Gathering via Research - (405)
Meta Attack PatternMeta Attack Pattern Software Integrity Attack - (184)
Meta Attack PatternMeta Attack Pattern Sustained Client Engagement - (227)
Meta Attack PatternMeta Attack Pattern Target Influence via Eye Cues - (429)
Meta Attack PatternMeta Attack Pattern Target Influence via Framing - (425)
Meta Attack PatternMeta Attack Pattern Target Influence via Instant Rapport - (435)
Meta Attack PatternMeta Attack Pattern Target Influence via Interview and Interrogation - (434)
Meta Attack PatternMeta Attack Pattern Target Influence via Manipulation of Incentives - (426)
Meta Attack PatternMeta Attack Pattern Target Influence via Micro-Expressions - (430)
Meta Attack PatternMeta Attack Pattern Target Influence via Modes of Thinking - (428)
Meta Attack PatternMeta Attack Pattern Target Influence via Neuro-Linguistic Programming (NLP) - (431)
Meta Attack PatternMeta Attack Pattern Target Influence via Perception of Authority - (421)
Meta Attack PatternMeta Attack Pattern Target Influence via Perception of Commitment and Consistency - (422)
Meta Attack PatternMeta Attack Pattern Target Influence via Perception of Concession - (419)
Meta Attack PatternMeta Attack Pattern Target Influence via Perception of Consensus or Social Proof - (424)
Meta Attack PatternMeta Attack Pattern Target Influence via Perception of Liking - (423)
Meta Attack PatternMeta Attack Pattern Target Influence via Perception of Obligation - (418)
Meta Attack PatternMeta Attack Pattern Target Influence via Perception of Reciprocation - (417)
Meta Attack PatternMeta Attack Pattern Target Influence via Perception of Scarcity - (420)
Meta Attack PatternMeta Attack Pattern Target Influence via Psychological Principles - (427)
Meta Attack PatternMeta Attack Pattern Target Influence via Social Engineering - (416)
Meta Attack PatternMeta Attack Pattern Target Influence via The Human Buffer Overflow - (433)
Meta Attack PatternMeta Attack Pattern Target Influence via Voice in NLP - (432)
Meta Attack PatternMeta Attack Pattern Traffic Injection - (594)
Meta Attack PatternMeta Attack Pattern Web Services Protocol Manipulation - (278)
+ Content History
Submissions
SubmitterOrganizationDateSource
CAPEC Content TeamThe MITRE Corporation2014-06-23Internal_CAPEC_Team

Filter Used: .//@Pattern_Abstraction='Meta'

CAPECs in this viewTotal CAPECs
Total102out of623
Views0out of9
Categories0out of72
Attack Patterns102out of542

More information is available — Please select a different filter.
Page Last Updated or Reviewed: May 01, 2017