Expand All | Collapse All
1000 - Mechanisms of Attack
+CategoryCategoryGather Information - (118)Gather Information - (118)
+Meta Attack PatternMeta Attack PatternExcavation - (116)Excavation - (116)
+Standard Attack PatternStandard Attack PatternPull Data from System Resources - (545)Pull Data from System Resources - (545)
*Detailed Attack PatternDetailed Attack PatternProbe iOS Screenshots - (498)Probe iOS Screenshots - (498)
*Detailed Attack PatternDetailed Attack PatternProbe Application Memory - (546)Probe Application Memory - (546)
+Standard Attack PatternStandard Attack PatternObtain Data via Utilities - (567)Obtain Data via Utilities - (567)
*Detailed Attack PatternDetailed Attack PatternDump Password Hashes - (566)Dump Password Hashes - (566)
+Meta Attack PatternMeta Attack PatternInterception - (117)Interception - (117)
+Meta Attack PatternMeta Attack PatternFootprinting - (169)Footprinting - (169)
+Standard Attack PatternStandard Attack PatternHost Discovery - (292)Host Discovery - (292)
*Detailed Attack PatternDetailed Attack PatternICMP Echo Request Ping - (285)ICMP Echo Request Ping - (285)
*Detailed Attack PatternDetailed Attack PatternICMP Address Mask Request - (294)ICMP Address Mask Request - (294)
*Detailed Attack PatternDetailed Attack PatternICMP Timestamp Request - (295)ICMP Timestamp Request - (295)
*Detailed Attack PatternDetailed Attack PatternICMP Information Request - (296)ICMP Information Request - (296)
*Detailed Attack PatternDetailed Attack PatternTCP ACK Ping - (297)TCP ACK Ping - (297)
*Detailed Attack PatternDetailed Attack PatternUDP Ping - (298)UDP Ping - (298)
*Detailed Attack PatternDetailed Attack PatternTCP SYN Ping - (299)TCP SYN Ping - (299)
*Detailed Attack PatternDetailed Attack PatternWiFi MAC Address Tracking - (612)WiFi MAC Address Tracking - (612)
*Detailed Attack PatternDetailed Attack PatternWiFi SSID Tracking - (613)WiFi SSID Tracking - (613)
*Detailed Attack PatternDetailed Attack PatternSignal Strength Tracking - (619)Signal Strength Tracking - (619)
+Standard Attack PatternStandard Attack PatternPort Scanning - (300)Port Scanning - (300)
*Detailed Attack PatternDetailed Attack PatternTCP SYN Scan - (287)TCP SYN Scan - (287)
*Detailed Attack PatternDetailed Attack PatternTCP Connect Scan - (301)TCP Connect Scan - (301)
*Detailed Attack PatternDetailed Attack PatternTCP FIN scan - (302)TCP FIN scan - (302)
*Detailed Attack PatternDetailed Attack PatternTCP Xmas Scan - (303)TCP Xmas Scan - (303)
*Detailed Attack PatternDetailed Attack PatternTCP Null Scan - (304)TCP Null Scan - (304)
*Detailed Attack PatternDetailed Attack PatternTCP ACK Scan - (305)TCP ACK Scan - (305)
*Detailed Attack PatternDetailed Attack PatternTCP Window Scan - (306)TCP Window Scan - (306)
*Detailed Attack PatternDetailed Attack PatternTCP RPC Scan - (307)TCP RPC Scan - (307)
*Detailed Attack PatternDetailed Attack PatternUDP Scan - (308)UDP Scan - (308)
+Standard Attack PatternStandard Attack PatternNetwork Topology Mapping - (309)Network Topology Mapping - (309)
*Detailed Attack PatternDetailed Attack PatternDNS Zone Transfers - (291)DNS Zone Transfers - (291)
*Detailed Attack PatternDetailed Attack PatternTraceroute Route Enumeration - (293)Traceroute Route Enumeration - (293)
*Detailed Attack PatternDetailed Attack PatternProcess Footprinting - (573)Process Footprinting - (573)
*Detailed Attack PatternDetailed Attack PatternServices Footprinting - (574)Services Footprinting - (574)
*Detailed Attack PatternDetailed Attack PatternAccount Footprinting - (575)Account Footprinting - (575)
*Detailed Attack PatternDetailed Attack PatternGroup Permission Footprinting - (576)Group Permission Footprinting - (576)
*Detailed Attack PatternDetailed Attack PatternOwner Footprinting - (577)Owner Footprinting - (577)
+Standard Attack PatternStandard Attack PatternApplication Footprinting - (580)Application Footprinting - (580)
+Meta Attack PatternMeta Attack PatternFingerprinting - (224)Fingerprinting - (224)
+Standard Attack PatternStandard Attack PatternOS Fingerprinting - (311)OS Fingerprinting - (311)
+Standard Attack PatternStandard Attack PatternActive OS Fingerprinting - (312)Active OS Fingerprinting - (312)
+Standard Attack PatternStandard Attack PatternTCP/IP Fingerprinting Probes - (315)TCP/IP Fingerprinting Probes - (315)
*Standard Attack PatternStandard Attack PatternPassive OS Fingerprinting - (313)Passive OS Fingerprinting - (313)
+Standard Attack PatternStandard Attack PatternApplication Fingerprinting - (541)Application Fingerprinting - (541)
*Detailed Attack PatternDetailed Attack PatternBrowser Fingerprinting - (472)Browser Fingerprinting - (472)
*Detailed Attack PatternDetailed Attack PatternAJAX Fingerprinting - (85)AJAX Fingerprinting - (85)
+Meta Attack PatternMeta Attack PatternSocial Information Gathering Attacks - (404)Social Information Gathering Attacks - (404)
+Meta Attack PatternMeta Attack PatternInformation Elicitation via Social Engineering - (410)Information Elicitation via Social Engineering - (410)
+CategoryCategoryDeplete Resources - (119)Deplete Resources - (119)
+Meta Attack PatternMeta Attack PatternFlooding - (125)Flooding - (125)
*Standard Attack PatternStandard Attack PatternTCP Flood - (482)TCP Flood - (482)
*Standard Attack PatternStandard Attack PatternUDP Flood - (486)UDP Flood - (486)
*Standard Attack PatternStandard Attack PatternICMP Flood - (487)ICMP Flood - (487)
*Standard Attack PatternStandard Attack PatternHTTP Flood - (488)HTTP Flood - (488)
*Standard Attack PatternStandard Attack PatternSSL Flood - (489)SSL Flood - (489)
+Standard Attack PatternStandard Attack PatternXML Flood - (528)XML Flood - (528)
*Detailed Attack PatternDetailed Attack PatternXML Ping of the Death - (147)XML Ping of the Death - (147)
+Meta Attack PatternMeta Attack PatternExcessive Allocation - (130)Excessive Allocation - (130)
+Standard Attack PatternStandard Attack PatternXML Nested Payloads - (230)XML Nested Payloads - (230)
*Detailed Attack PatternDetailed Attack PatternXML Entity Expansion - (197)XML Entity Expansion - (197)
*Detailed Attack PatternDetailed Attack PatternXML Quadratic Expansion - (491)XML Quadratic Expansion - (491)
+Standard Attack PatternStandard Attack PatternXML Oversized Payloads - (231)XML Oversized Payloads - (231)
*Detailed Attack PatternDetailed Attack PatternXML Entity Blowup - (201)XML Entity Blowup - (201)
*Detailed Attack PatternDetailed Attack PatternXML Attribute Blowup - (229)XML Attribute Blowup - (229)
*Standard Attack PatternStandard Attack PatternSOAP Array Blowup - (493)SOAP Array Blowup - (493)
*Standard Attack PatternStandard Attack PatternTCP Fragmentation - (494)TCP Fragmentation - (494)
*Standard Attack PatternStandard Attack PatternUDP Fragmentation - (495)UDP Fragmentation - (495)
*Standard Attack PatternStandard Attack PatternICMP Fragmentation - (496)ICMP Fragmentation - (496)
*Meta Attack PatternMeta Attack PatternResource Leak Exposure - (131)Resource Leak Exposure - (131)
+Meta Attack PatternMeta Attack PatternSustained Client Engagement - (227)Sustained Client Engagement - (227)
*Standard Attack PatternStandard Attack PatternHTTP DoS - (469)HTTP DoS - (469)
*Meta Attack PatternMeta Attack PatternAmplification - (490)Amplification - (490)
+CategoryCategoryInjection - (152)Injection - (152)
+Meta Attack PatternMeta Attack PatternParameter Injection - (137)Parameter Injection - (137)
+Meta Attack PatternMeta Attack PatternCode Inclusion - (175)Code Inclusion - (175)
+Standard Attack PatternStandard Attack PatternLocal Code Inclusion - (251)Local Code Inclusion - (251)
*Detailed Attack PatternDetailed Attack PatternPHP Local File Inclusion - (252)PHP Local File Inclusion - (252)
+Standard Attack PatternStandard Attack PatternRemote Code Inclusion - (253)Remote Code Inclusion - (253)
*Detailed Attack PatternDetailed Attack PatternPHP Remote File Inclusion - (193)PHP Remote File Inclusion - (193)
*Detailed Attack PatternDetailed Attack PatternWebView Injection - (500)WebView Injection - (500)
+Meta Attack PatternMeta Attack PatternResource Injection - (240)Resource Injection - (240)
*Detailed Attack PatternDetailed Attack PatternCellular Data Injection - (610)Cellular Data Injection - (610)
+Meta Attack PatternMeta Attack PatternCode Injection - (242)Code Injection - (242)
+Standard Attack PatternStandard Attack PatternEmbedding Scripts in Non-Script Elements - (18)Embedding Scripts in Non-Script Elements - (18)
+Detailed Attack PatternDetailed Attack PatternEmbedding Script (XSS) in HTTP Headers - (86)Embedding Script (XSS) in HTTP Headers - (86)
*Standard Attack PatternStandard Attack PatternCross Site Tracing - (107)Cross Site Tracing - (107)
*Detailed Attack PatternDetailed Attack PatternXSS in IMG Tags - (91)XSS in IMG Tags - (91)
+Standard Attack PatternStandard Attack PatternFile Content Injection - (23)File Content Injection - (23)
+Standard Attack PatternStandard Attack PatternSimple Script Injection - (63)Simple Script Injection - (63)
+Standard Attack PatternStandard Attack PatternEmbedding Scripts in Non-Script Elements - (18)Embedding Scripts in Non-Script Elements - (18)
+Detailed Attack PatternDetailed Attack PatternEmbedding Script (XSS) in HTTP Headers - (86)Embedding Script (XSS) in HTTP Headers - (86)
*Standard Attack PatternStandard Attack PatternCross Site Tracing - (107)Cross Site Tracing - (107)
*Detailed Attack PatternDetailed Attack PatternXSS in IMG Tags - (91)XSS in IMG Tags - (91)
*Standard Attack PatternStandard Attack PatternUser-Controlled Filename - (73)User-Controlled Filename - (73)
+Meta Attack PatternMeta Attack PatternCommand Injection - (248)Command Injection - (248)
*Standard Attack PatternStandard Attack PatternLDAP Injection - (136)LDAP Injection - (136)
+Standard Attack PatternStandard Attack PatternFlash Injection - (182)Flash Injection - (182)
*Detailed Attack PatternDetailed Attack PatternCross-Site Flashing - (178)Cross-Site Flashing - (178)
*Standard Attack PatternStandard Attack PatternIMAP/SMTP Command Injection - (183)IMAP/SMTP Command Injection - (183)
+Standard Attack PatternStandard Attack PatternXML Injection - (250)XML Injection - (250)
*Detailed Attack PatternDetailed Attack PatternDTD Injection - (228)DTD Injection - (228)
*Detailed Attack PatternDetailed Attack PatternXPath Injection - (83)XPath Injection - (83)
*Detailed Attack PatternDetailed Attack PatternXQuery Injection - (84)XQuery Injection - (84)
*Standard Attack PatternStandard Attack PatternOS Command Injection - (88)OS Command Injection - (88)
+Meta Attack PatternMeta Attack PatternFault Injection - (624)Fault Injection - (624)
*Detailed Attack PatternDetailed Attack PatternMobile Device Fault Injection - (625)Mobile Device Fault Injection - (625)
+CategoryCategoryDeceptive Interactions - (156)Deceptive Interactions - (156)
+Meta Attack PatternMeta Attack PatternPath Traversal - (126)Path Traversal - (126)
+Meta Attack PatternMeta Attack PatternContent Spoofing - (148)Content Spoofing - (148)
+Standard Attack PatternStandard Attack PatternCache Poisoning - (141)Cache Poisoning - (141)
*Detailed Attack PatternDetailed Attack PatternDNS Cache Poisoning - (142)DNS Cache Poisoning - (142)
*Detailed Attack PatternDetailed Attack PatternChecksum Spoofing - (145)Checksum Spoofing - (145)
*Standard Attack PatternStandard Attack PatternIntent Spoof - (502)Intent Spoof - (502)
*Detailed Attack PatternDetailed Attack PatternSignature-Based Avoidance - (570)Signature-Based Avoidance - (570)
*Detailed Attack PatternDetailed Attack PatternCarry-Off GPS Attack - (628)Carry-Off GPS Attack - (628)
+Meta Attack PatternMeta Attack PatternIdentity Spoofing - (151)Identity Spoofing - (151)
+Standard Attack PatternStandard Attack PatternFake the Source of Data - (194)Fake the Source of Data - (194)
*Detailed Attack PatternDetailed Attack PatternCounterfeit Websites - (543)Counterfeit Websites - (543)
*Detailed Attack PatternDetailed Attack PatternCounterfeit Organizations - (544)Counterfeit Organizations - (544)
*Detailed Attack PatternDetailed Attack PatternCounterfeit GPS Signals - (627)Counterfeit GPS Signals - (627)
*Standard Attack PatternStandard Attack PatternPrincipal Spoof - (195)Principal Spoof - (195)
+Standard Attack PatternStandard Attack PatternSignature Spoof - (473)Signature Spoof - (473)
*Standard Attack PatternStandard Attack PatternPharming - (89)Pharming - (89)
+Standard Attack PatternStandard Attack PatternPhishing - (98)Phishing - (98)
*Standard Attack PatternStandard Attack PatternSpear Phishing - (163)Spear Phishing - (163)
+Meta Attack PatternMeta Attack PatternResource Location Spoofing - (154)Resource Location Spoofing - (154)
+Standard Attack PatternStandard Attack PatternPatiently Waiting at Incorrect Location - (616)Patiently Waiting at Incorrect Location - (616)
*Detailed Attack PatternDetailed Attack PatternBitSquatting - (611)BitSquatting - (611)
*Detailed Attack PatternDetailed Attack PatternEvil Twin Wi-Fi Attack - (615)Evil Twin Wi-Fi Attack - (615)
*Detailed Attack PatternDetailed Attack PatternCellular Rogue Base Station - (617)Cellular Rogue Base Station - (617)
+Meta Attack PatternMeta Attack PatternAction Spoofing - (173)Action Spoofing - (173)
+Standard Attack PatternStandard Attack PatternClickjacking - (103)Clickjacking - (103)
*Standard Attack PatternStandard Attack PatternFlash File Overlay - (181)Flash File Overlay - (181)
*Standard Attack PatternStandard Attack PatterniFrame Overlay - (222)iFrame Overlay - (222)
*Detailed Attack PatternDetailed Attack PatternActivity Hijack - (501)Activity Hijack - (501)
*Detailed Attack PatternDetailed Attack PatternTask Impersonation - (504)Task Impersonation - (504)
*Detailed Attack PatternDetailed Attack PatternScheme Squatting - (505)Scheme Squatting - (505)
*Standard Attack PatternStandard Attack PatternTapjacking - (506)Tapjacking - (506)
+Meta Attack PatternMeta Attack PatternSoftware Integrity Attack - (184)Software Integrity Attack - (184)
*Standard Attack PatternStandard Attack PatternMalicious Software Download - (185)Malicious Software Download - (185)
+Standard Attack PatternStandard Attack PatternMalicious Software Update - (186)Malicious Software Update - (186)
*Detailed Attack PatternDetailed Attack PatternRooting SIM CardS - (614)Rooting SIM CardS - (614)
+Meta Attack PatternMeta Attack PatternHardware Integrity Attack - (440)Hardware Integrity Attack - (440)
+Standard Attack PatternStandard Attack PatternHacking Hardware - (401)Hacking Hardware - (401)
+Standard Attack PatternStandard Attack PatternMalicious Hardware Update - (534)Malicious Hardware Update - (534)
+CategoryCategoryManipulate Timing and State - (172)Manipulate Timing and State - (172)
+CategoryCategoryAbuse of Functionality - (210)Abuse of Functionality - (210)
+Meta Attack PatternMeta Attack PatternAPI Manipulation - (113)API Manipulation - (113)
*Standard Attack PatternStandard Attack PatternExploit Test APIs - (121)Exploit Test APIs - (121)
*Standard Attack PatternStandard Attack PatternTry All Common Switches - (133)Try All Common Switches - (133)
*Standard Attack PatternStandard Attack PatternExploit Script-Based APIs - (160)Exploit Script-Based APIs - (160)
*Standard Attack PatternStandard Attack PatternUsing Unpublished APIs - (36)Using Unpublished APIs - (36)
+Meta Attack PatternMeta Attack PatternFunctionality Misuse - (212)Functionality Misuse - (212)
+Meta Attack PatternMeta Attack PatternCommunication Channel Manipulation - (216)Communication Channel Manipulation - (216)
+Meta Attack PatternMeta Attack PatternFunctionality Bypass - (554)Functionality Bypass - (554)
*Standard Attack PatternStandard Attack PatternEvercookie - (464)Evercookie - (464)
*Detailed Attack PatternDetailed Attack PatternTransparent Proxy Abuse - (465)Transparent Proxy Abuse - (465)
+CategoryCategoryProbabilistic Techniques - (223)Probabilistic Techniques - (223)
+CategoryCategoryExploitation of Authentication - (225)Exploitation of Authentication - (225)
+Meta Attack PatternMeta Attack PatternAuthentication Abuse - (114)Authentication Abuse - (114)
+Meta Attack PatternMeta Attack PatternAuthentication Bypass - (115)Authentication Bypass - (115)
+Meta Attack PatternMeta Attack PatternExploitation of Trusted Credentials - (21)Exploitation of Trusted Credentials - (21)
+CategoryCategoryExploitation of Authorization - (232)Exploitation of Authorization - (232)
+Meta Attack PatternMeta Attack PatternPrivilege Abuse - (122)Privilege Abuse - (122)
+Meta Attack PatternMeta Attack PatternExploiting Trust in Client - (22)Exploiting Trust in Client - (22)
*Standard Attack PatternStandard Attack PatternCreate Malicious Client - (202)Create Malicious Client - (202)
+Standard Attack PatternStandard Attack PatternManipulating User-Controlled Variables - (77)Manipulating User-Controlled Variables - (77)
+Standard Attack PatternStandard Attack PatternMan in the Middle Attack - (94)Man in the Middle Attack - (94)
+Meta Attack PatternMeta Attack PatternPrivilege Escalation - (233)Privilege Escalation - (233)
*Standard Attack PatternStandard Attack PatternHijacking a privileged process - (234)Hijacking a privileged process - (234)
+Detailed Attack PatternDetailed Attack PatternCatching exception throw/signal from privileged block - (236)Catching exception throw/signal from privileged block - (236)
+Standard Attack PatternStandard Attack PatternHijacking a Privileged Thread of Execution - (30)Hijacking a Privileged Thread of Execution - (30)
+Standard Attack PatternStandard Attack PatternSubvert Code-signing Facilities - (68)Subvert Code-signing Facilities - (68)
*Standard Attack PatternStandard Attack PatternTarget Programs with Elevated Privileges - (69)Target Programs with Elevated Privileges - (69)
+CategoryCategoryManipulate Data Structures - (255)Manipulate Data Structures - (255)
+Meta Attack PatternMeta Attack PatternBuffer Manipulation - (123)Buffer Manipulation - (123)
+Standard Attack PatternStandard Attack PatternOverflow Buffers - (100)Overflow Buffers - (100)
*Detailed Attack PatternDetailed Attack PatternSOAP Array Overflow - (256)SOAP Array Overflow - (256)
*Detailed Attack PatternDetailed Attack PatternMIME Conversion - (42)MIME Conversion - (42)
*Detailed Attack PatternDetailed Attack PatternOverflow Variables and Tags - (46)Overflow Variables and Tags - (46)
*Standard Attack PatternStandard Attack PatternOverread Buffers - (540)Overread Buffers - (540)
*Standard Attack PatternStandard Attack PatternAttack through Shared Data - (124)Attack through Shared Data - (124)
+Standard Attack PatternStandard Attack PatternInteger Attacks - (128)Integer Attacks - (128)
*Standard Attack PatternStandard Attack PatternForced Integer Overflow - (92)Forced Integer Overflow - (92)
*Standard Attack PatternStandard Attack PatternPointer Attack - (129)Pointer Attack - (129)
*Detailed Attack PatternDetailed Attack PatternAccessing/Intercepting/Modifying HTTP Cookies - (31)Accessing/Intercepting/Modifying HTTP Cookies - (31)
+CategoryCategoryManipulate Resources - (262)Manipulate Resources - (262)
+Standard Attack PatternStandard Attack PatternInput Data Manipulation - (153)Input Data Manipulation - (153)
+Standard Attack PatternStandard Attack PatternLeverage Alternate Encoding - (267)Leverage Alternate Encoding - (267)
*Standard Attack PatternStandard Attack PatternDouble Encoding - (120)Double Encoding - (120)
+Meta Attack PatternMeta Attack PatternInfrastructure Manipulation - (161)Infrastructure Manipulation - (161)
*Detailed Attack PatternDetailed Attack PatternDNS Cache Poisoning - (142)DNS Cache Poisoning - (142)
+Meta Attack PatternMeta Attack PatternFile Manipulation - (165)File Manipulation - (165)
+Standard Attack PatternStandard Attack PatternVariable Manipulation - (171)Variable Manipulation - (171)
*Detailed Attack PatternDetailed Attack PatternManipulating Hidden Fields - (162)Manipulating Hidden Fields - (162)
+Meta Attack PatternMeta Attack PatternGlobal variable manipulation - (265)Global variable manipulation - (265)
+Meta Attack PatternMeta Attack PatternConfiguration/Environment Manipulation - (176)Configuration/Environment Manipulation - (176)
*Meta Attack PatternMeta Attack PatternAbuse of Transaction Data Structure - (257)Abuse of Transaction Data Structure - (257)
+Meta Attack PatternMeta Attack PatternAudit Log Manipulation - (268)Audit Log Manipulation - (268)
+Meta Attack PatternMeta Attack PatternSchema Poisoning - (271)Schema Poisoning - (271)
*Standard Attack PatternStandard Attack PatternXML Schema Poisoning - (146)XML Schema Poisoning - (146)
+Meta Attack PatternMeta Attack PatternProtocol Manipulation - (272)Protocol Manipulation - (272)
+Standard Attack PatternStandard Attack PatternClient-Server Protocol Manipulation - (220)Client-Server Protocol Manipulation - (220)
*Standard Attack PatternStandard Attack PatternDNS Rebinding - (275)DNS Rebinding - (275)
+Meta Attack PatternMeta Attack PatternWeb Services Protocol Manipulation - (278)Web Services Protocol Manipulation - (278)
+Standard Attack PatternStandard Attack PatternXML External Entities - (221)XML External Entities - (221)
*Detailed Attack PatternDetailed Attack PatternXML Entity Blowup - (201)XML Entity Blowup - (201)
+Standard Attack PatternStandard Attack PatternSoap Manipulation - (279)Soap Manipulation - (279)
*Detailed Attack PatternDetailed Attack PatternSOAP Parameter Tampering - (280)SOAP Parameter Tampering - (280)
*Detailed Attack PatternDetailed Attack PatternAccessing/Intercepting/Modifying HTTP Cookies - (31)Accessing/Intercepting/Modifying HTTP Cookies - (31)
*Meta Attack PatternMeta Attack PatternContaminate Resource - (548)Contaminate Resource - (548)
*Detailed Attack PatternDetailed Attack PatternModify Shared File - (562)Modify Shared File - (562)
+Meta Attack PatternMeta Attack PatternObstruction - (607)Obstruction - (607)
+Standard Attack PatternStandard Attack PatternJamming - (601)Jamming - (601)
*Detailed Attack PatternDetailed Attack PatternWi-Fi Jamming - (604)Wi-Fi Jamming - (604)
*Detailed Attack PatternDetailed Attack PatternCellular Jamming - (605)Cellular Jamming - (605)
*Standard Attack PatternStandard Attack PatternBlockage - (603)Blockage - (603)
+CategoryCategoryAnalyze Target - (281)Analyze Target - (281)
+Meta Attack PatternMeta Attack PatternReverse Engineering - (188)Reverse Engineering - (188)
+Meta Attack PatternMeta Attack PatternProtocol Analysis - (192)Protocol Analysis - (192)
+Standard Attack PatternStandard Attack PatternCryptanalysis - (97)Cryptanalysis - (97)
+CategoryCategoryGain Physical Access - (436)Gain Physical Access - (436)
+CategoryCategoryExecute Code - (525)Execute Code - (525)
+Meta Attack PatternMeta Attack PatternLocal Execution of Code - (549)Local Execution of Code - (549)
+Standard Attack PatternStandard Attack PatternTargeted Malware - (542)Targeted Malware - (542)
*Detailed Attack PatternDetailed Attack PatternInstall New Service - (550)Install New Service - (550)
*Detailed Attack PatternDetailed Attack PatternModify Existing Service - (551)Modify Existing Service - (551)
*Detailed Attack PatternDetailed Attack PatternInstall Rootkit - (552)Install Rootkit - (552)
*Detailed Attack PatternDetailed Attack PatternSchedule Software To Run - (557)Schedule Software To Run - (557)
*Detailed Attack PatternDetailed Attack PatternReplace Trusted Executable - (558)Replace Trusted Executable - (558)
*Detailed Attack PatternDetailed Attack PatternRun Software at Logon - (564)Run Software at Logon - (564)
*Detailed Attack PatternDetailed Attack PatternReplace Winlogon Helper DLL - (579)Replace Winlogon Helper DLL - (579)
+CategoryCategoryAlter System Components - (526)Alter System Components - (526)
+Meta Attack PatternMeta Attack PatternModification During Manufacture - (438)Modification During Manufacture - (438)
+Standard Attack PatternStandard Attack PatternDevelopment Alteration - (444)Development Alteration - (444)
+Meta Attack PatternMeta Attack PatternManipulation During Distribution - (439)Manipulation During Distribution - (439)
+Meta Attack PatternMeta Attack PatternMalicious Logic Insertion - (441)Malicious Logic Insertion - (441)
+CategoryCategoryManipulate System Users - (527)Manipulate System Users - (527)
+Meta Attack PatternMeta Attack PatternTarget Influence via Social Engineering - (416)Target Influence via Social Engineering - (416)
+Meta Attack PatternMeta Attack PatternTarget Influence via Psychological Principles - (427)Target Influence via Psychological Principles - (427)
Back to top