Home > CAPEC List > CAPEC-3000: Domains of Attack (Version 2.9)  

CAPEC VIEW: Domains of Attack

 
Domains of Attack
Definition in a New Window Definition in a New Window
View ID: 3000
Structure: Graph
Status: Draft
+ View Objective

This view organizes attack patterns hierarchically based on the attack domain.

+ Relationships
3000 - Domains of Attack
+CategoryCategoryCommunications - (512)Communications - (512)
*Meta Attack PatternMeta Attack PatternInterception - (117)Interception - (117)
*Meta Attack PatternMeta Attack PatternProtocol Manipulation - (272)Protocol Manipulation - (272)
*Meta Attack PatternMeta Attack PatternTraffic Injection - (594)Traffic Injection - (594)
*Meta Attack PatternMeta Attack PatternObstruction - (607)Obstruction - (607)
+CategoryCategorySoftware - (513)Software - (513)
*Meta Attack PatternMeta Attack PatternBrute Force - (112)Brute Force - (112)
*Meta Attack PatternMeta Attack PatternAuthentication Abuse - (114)Authentication Abuse - (114)
*Meta Attack PatternMeta Attack PatternAuthentication Bypass - (115)Authentication Bypass - (115)
*Meta Attack PatternMeta Attack PatternExcavation - (116)Excavation - (116)
*Meta Attack PatternMeta Attack PatternBuffer Manipulation - (123)Buffer Manipulation - (123)
*Meta Attack PatternMeta Attack PatternFlooding - (125)Flooding - (125)
*Meta Attack PatternMeta Attack PatternPointer Manipulation - (129)Pointer Manipulation - (129)
*Meta Attack PatternMeta Attack PatternExcessive Allocation - (130)Excessive Allocation - (130)
*Meta Attack PatternMeta Attack PatternResource Leak Exposure - (131)Resource Leak Exposure - (131)
*Meta Attack PatternMeta Attack PatternParameter Injection - (137)Parameter Injection - (137)
*Meta Attack PatternMeta Attack PatternContent Spoofing - (148)Content Spoofing - (148)
*Meta Attack PatternMeta Attack PatternIdentity Spoofing - (151)Identity Spoofing - (151)
*Meta Attack PatternMeta Attack PatternInput Data Manipulation - (153)Input Data Manipulation - (153)
*Meta Attack PatternMeta Attack PatternResource Location Spoofing - (154)Resource Location Spoofing - (154)
*Meta Attack PatternMeta Attack PatternFootprinting - (169)Footprinting - (169)
*Meta Attack PatternMeta Attack PatternAction Spoofing - (173)Action Spoofing - (173)
*Meta Attack PatternMeta Attack PatternCode Inclusion - (175)Code Inclusion - (175)
*Meta Attack PatternMeta Attack PatternSoftware Integrity Attack - (184)Software Integrity Attack - (184)
*Meta Attack PatternMeta Attack PatternReverse Engineering - (188)Reverse Engineering - (188)
*Meta Attack PatternMeta Attack PatternFunctionality Misuse - (212)Functionality Misuse - (212)
*Meta Attack PatternMeta Attack PatternFingerprinting - (224)Fingerprinting - (224)
*Meta Attack PatternMeta Attack PatternCode Injection - (242)Code Injection - (242)
*Meta Attack PatternMeta Attack PatternCommand Injection - (248)Command Injection - (248)
+CategoryCategoryHardware - (515)Hardware - (515)
*Meta Attack PatternMeta Attack PatternFootprinting - (169)Footprinting - (169)
*Meta Attack PatternMeta Attack PatternHardware Integrity Attack - (440)Hardware Integrity Attack - (440)
*Meta Attack PatternMeta Attack PatternMalicious Logic Insertion - (441)Malicious Logic Insertion - (441)
+ Content History
Submissions
SubmitterOrganizationDateSource
CAPEC Content TeamThe MITRE Corporation2014-06-23Internal_CAPEC_Team
CAPECs in this viewTotal CAPECs
Total44out of609
Views0out of9
Categories6out of72
Attack Patterns38out of528

More information is available — Please select a different filter.
Page Last Updated or Reviewed: December 07, 2015