Home > CAPEC List > CAPEC-545: Pull Data from System Resources (Version 2.11)  

CAPEC-545: Pull Data from System Resources

 
Pull Data from System Resources
Definition in a New Window Definition in a New Window
Attack Pattern ID: 545
Abstraction: Standard
Status: Draft
Completeness: Stub
Presentation Filter:
+ Summary

An adversary who is authorized or has the ability to search known system resources, does so with the intention of gathering useful information. System resources include files, memory, and other aspects of the target system. In this pattern of attack, the adversary does not necessarily know what they are going to find when they start pulling data. This is different than CAPEC-150 where the adversary knows what they are looking for due to the common location.

+ References
[R.545.1] ATT&CK Project. "Credentials in files (1081)". MITRE. <https://attack.mitre.org/wiki/Credentials_in_files>.
+ Content History
Submissions
SubmitterOrganizationDateSource
CAPEC Content TeamThe MITRE Corporation2014-06-23Internal_CAPEC_Team
Modifications
ModifierOrganizationDateCommentsSource
CAPEC Content TeamThe MITRE Corporation2015-11-09Updated Description Summary, ReferencesInternal
CAPEC Content TeamThe MITRE Corporation2015-12-07Updated Description SummaryInternal
Previous Entry Names
DatePrevious Entry Name
2015-11-09Probe Application Queries

More information is available — Please select a different filter.
Page Last Updated or Reviewed: July 31, 2017