Home > CAPEC List > CAPEC-568: Capture Credentials via Keylogger (Version 2.11)  

CAPEC-568: Capture Credentials via Keylogger

 
Capture Credentials via Keylogger
Definition in a New Window Definition in a New Window
Attack Pattern ID: 568
Abstraction: Detailed
Status: Draft
Completeness: Stub
Presentation Filter:
+ Summary

An adversary deploys a keylogger in an effort to obtain credentials directly from a system's user. After capturing all the keystrokes made by a user, the adversary can analyze the data and determine which string are likely to be passwords or other credential related information.

+ Attack Prerequisites
  • The ability to install the keylogger, either in person or remote.

+ Typical Severity

High

+ Solutions and Mitigations

Strong physical security can help reduce the ability of an adversary to install a keylogger.

+ Content History
Submissions
SubmitterOrganizationDateSource
CAPEC Content TeamThe MITRE Corporation2015-11-09Internal_CAPEC_Team

More information is available — Please select a different filter.
Page Last Updated or Reviewed: July 31, 2017