Expand All | Collapse All
1000 - Mechanisms of Attack
+CategoryCategoryGather Information - (118)Gather Information - (118)
+Meta Attack PatternMeta Attack PatternExcavation - (116)Excavation - (116)
*Standard Attack PatternStandard Attack PatternDirectory Indexing - (127)Directory Indexing - (127)
*Detailed Attack PatternDetailed Attack PatternCross-Domain Search Timing - (462)Cross-Domain Search Timing - (462)
*Standard Attack PatternStandard Attack PatternProbe Application Screenshots - (498)Probe Application Screenshots - (498)
*Standard Attack PatternStandard Attack PatternProbe Application Memory - (546)Probe Application Memory - (546)
+Meta Attack PatternMeta Attack PatternInterception - (117)Interception - (117)
+Meta Attack PatternMeta Attack PatternFootprinting - (169)Footprinting - (169)
+Standard Attack PatternStandard Attack PatternHost Discovery - (292)Host Discovery - (292)
*Detailed Attack PatternDetailed Attack PatternICMP Echo Request Ping - (285)ICMP Echo Request Ping - (285)
*Detailed Attack PatternDetailed Attack PatternICMP Address Mask Request - (294)ICMP Address Mask Request - (294)
*Detailed Attack PatternDetailed Attack PatternICMP Timestamp Request - (295)ICMP Timestamp Request - (295)
*Detailed Attack PatternDetailed Attack PatternICMP Information Request - (296)ICMP Information Request - (296)
*Detailed Attack PatternDetailed Attack PatternTCP ACK Ping - (297)TCP ACK Ping - (297)
*Detailed Attack PatternDetailed Attack PatternUDP Ping - (298)UDP Ping - (298)
*Detailed Attack PatternDetailed Attack PatternTCP SYN Ping - (299)TCP SYN Ping - (299)
+Standard Attack PatternStandard Attack PatternPort Scanning - (300)Port Scanning - (300)
*Detailed Attack PatternDetailed Attack PatternTCP SYN Scan - (287)TCP SYN Scan - (287)
*Detailed Attack PatternDetailed Attack PatternTCP Connect Scan - (301)TCP Connect Scan - (301)
*Detailed Attack PatternDetailed Attack PatternTCP FIN scan - (302)TCP FIN scan - (302)
*Detailed Attack PatternDetailed Attack PatternTCP Xmas Scan - (303)TCP Xmas Scan - (303)
*Detailed Attack PatternDetailed Attack PatternTCP Null Scan - (304)TCP Null Scan - (304)
*Detailed Attack PatternDetailed Attack PatternTCP ACK Scan - (305)TCP ACK Scan - (305)
*Detailed Attack PatternDetailed Attack PatternTCP Window Scan - (306)TCP Window Scan - (306)
*Detailed Attack PatternDetailed Attack PatternTCP RPC Scan - (307)TCP RPC Scan - (307)
*Detailed Attack PatternDetailed Attack PatternUDP Scan - (308)UDP Scan - (308)
+Standard Attack PatternStandard Attack PatternNetwork Topology Mapping - (309)Network Topology Mapping - (309)
*Detailed Attack PatternDetailed Attack PatternDNS Zone Transfers - (291)DNS Zone Transfers - (291)
*Detailed Attack PatternDetailed Attack PatternTraceroute Route Enumeration - (293)Traceroute Route Enumeration - (293)
+Meta Attack PatternMeta Attack PatternFingerprinting - (224)Fingerprinting - (224)
+Standard Attack PatternStandard Attack PatternOS Fingerprinting - (311)OS Fingerprinting - (311)
+Standard Attack PatternStandard Attack PatternActive OS Fingerprinting - (312)Active OS Fingerprinting - (312)
+Standard Attack PatternStandard Attack PatternTCP/IP Fingerprinting Probes - (315)TCP/IP Fingerprinting Probes - (315)
*Standard Attack PatternStandard Attack PatternPassive OS Fingerprinting - (313)Passive OS Fingerprinting - (313)
+Standard Attack PatternStandard Attack PatternApplication Fingerprinting - (541)Application Fingerprinting - (541)
*Detailed Attack PatternDetailed Attack PatternBrowser Fingerprinting - (472)Browser Fingerprinting - (472)
*Detailed Attack PatternDetailed Attack PatternAJAX Fingerprinting - (85)AJAX Fingerprinting - (85)
+Meta Attack PatternMeta Attack PatternSocial Information Gathering Attacks - (404)Social Information Gathering Attacks - (404)
+Meta Attack PatternMeta Attack PatternInformation Elicitation via Social Engineering - (410)Information Elicitation via Social Engineering - (410)
+CategoryCategoryDeplete Resources - (119)Deplete Resources - (119)
+Meta Attack PatternMeta Attack PatternFlooding - (125)Flooding - (125)
*Standard Attack PatternStandard Attack PatternTCP Flood - (482)TCP Flood - (482)
*Standard Attack PatternStandard Attack PatternUDP Flood - (486)UDP Flood - (486)
*Standard Attack PatternStandard Attack PatternICMP Flood - (487)ICMP Flood - (487)
*Standard Attack PatternStandard Attack PatternHTTP Flood - (488)HTTP Flood - (488)
*Standard Attack PatternStandard Attack PatternSSL Flood - (489)SSL Flood - (489)
+Standard Attack PatternStandard Attack PatternXML Flood - (528)XML Flood - (528)
*Detailed Attack PatternDetailed Attack PatternXML Ping of the Death - (147)XML Ping of the Death - (147)
+Meta Attack PatternMeta Attack PatternExcessive Allocation - (130)Excessive Allocation - (130)
+Standard Attack PatternStandard Attack PatternXML Nested Payloads - (230)XML Nested Payloads - (230)
*Detailed Attack PatternDetailed Attack PatternXML Entity Expansion - (197)XML Entity Expansion - (197)
*Detailed Attack PatternDetailed Attack PatternXML Quadratic Expansion - (491)XML Quadratic Expansion - (491)
+Standard Attack PatternStandard Attack PatternXML Oversized Payloads - (231)XML Oversized Payloads - (231)
*Detailed Attack PatternDetailed Attack PatternXML Entity Blowup - (201)XML Entity Blowup - (201)
*Detailed Attack PatternDetailed Attack PatternXML Attribute Blowup - (229)XML Attribute Blowup - (229)
*Standard Attack PatternStandard Attack PatternSOAP Array Blowup - (493)SOAP Array Blowup - (493)
*Standard Attack PatternStandard Attack PatternTCP Fragmentation - (494)TCP Fragmentation - (494)
*Standard Attack PatternStandard Attack PatternUDP Fragmentation - (495)UDP Fragmentation - (495)
*Standard Attack PatternStandard Attack PatternICMP Fragmentation - (496)ICMP Fragmentation - (496)
*Meta Attack PatternMeta Attack PatternResource Leak Exposure - (131)Resource Leak Exposure - (131)
+Meta Attack PatternMeta Attack PatternSustained Client Engagement - (227)Sustained Client Engagement - (227)
*Standard Attack PatternStandard Attack PatternHTTP DoS - (469)HTTP DoS - (469)
*Meta Attack PatternMeta Attack PatternAmplification - (490)Amplification - (490)
+CategoryCategoryInjection - (152)Injection - (152)
+Meta Attack PatternMeta Attack PatternParameter Injection - (137)Parameter Injection - (137)
+Meta Attack PatternMeta Attack PatternCode Inclusion - (175)Code Inclusion - (175)
+Standard Attack PatternStandard Attack PatternLocal Code Inclusion - (251)Local Code Inclusion - (251)
*Detailed Attack PatternDetailed Attack PatternPHP Local File Inclusion - (252)PHP Local File Inclusion - (252)
+Standard Attack PatternStandard Attack PatternRemote Code Inclusion - (253)Remote Code Inclusion - (253)
*Detailed Attack PatternDetailed Attack PatternPHP Remote File Inclusion - (193)PHP Remote File Inclusion - (193)
*Detailed Attack PatternDetailed Attack PatternWebView Injection - (500)WebView Injection - (500)
+Meta Attack PatternMeta Attack PatternResource Injection - (240)Resource Injection - (240)
+Meta Attack PatternMeta Attack PatternCode Injection - (242)Code Injection - (242)
+Standard Attack PatternStandard Attack PatternEmbedding Scripts in Non-Script Elements - (18)Embedding Scripts in Non-Script Elements - (18)
+Detailed Attack PatternDetailed Attack PatternEmbedding Script (XSS) in HTTP Headers - (86)Embedding Script (XSS) in HTTP Headers - (86)
*Standard Attack PatternStandard Attack PatternCross Site Tracing - (107)Cross Site Tracing - (107)
*Detailed Attack PatternDetailed Attack PatternXSS in IMG Tags - (91)XSS in IMG Tags - (91)
+Standard Attack PatternStandard Attack PatternSimple Script Injection - (63)Simple Script Injection - (63)
+Standard Attack PatternStandard Attack PatternEmbedding Scripts in Non-Script Elements - (18)Embedding Scripts in Non-Script Elements - (18)
+Detailed Attack PatternDetailed Attack PatternEmbedding Script (XSS) in HTTP Headers - (86)Embedding Script (XSS) in HTTP Headers - (86)
*Standard Attack PatternStandard Attack PatternCross Site Tracing - (107)Cross Site Tracing - (107)
*Detailed Attack PatternDetailed Attack PatternXSS in IMG Tags - (91)XSS in IMG Tags - (91)
*Standard Attack PatternStandard Attack PatternUser-Controlled Filename - (73)User-Controlled Filename - (73)
+Meta Attack PatternMeta Attack PatternCommand Injection - (248)Command Injection - (248)
*Standard Attack PatternStandard Attack PatternLDAP Injection - (136)LDAP Injection - (136)
+Standard Attack PatternStandard Attack PatternFlash Injection - (182)Flash Injection - (182)
*Detailed Attack PatternDetailed Attack PatternCross-Site Flashing - (178)Cross-Site Flashing - (178)
*Standard Attack PatternStandard Attack PatternIMAP/SMTP Command Injection - (183)IMAP/SMTP Command Injection - (183)
+Standard Attack PatternStandard Attack PatternXML Injection - (250)XML Injection - (250)
*Detailed Attack PatternDetailed Attack PatternDTD Injection - (228)DTD Injection - (228)
*Detailed Attack PatternDetailed Attack PatternXPath Injection - (83)XPath Injection - (83)
*Detailed Attack PatternDetailed Attack PatternXQuery Injection - (84)XQuery Injection - (84)
*Standard Attack PatternStandard Attack PatternOS Command Injection - (88)OS Command Injection - (88)
+CategoryCategoryDeceptive Interactions - (156)Deceptive Interactions - (156)
+Meta Attack PatternMeta Attack PatternPath Traversal - (126)Path Traversal - (126)
+Meta Attack PatternMeta Attack PatternContent Spoofing - (148)Content Spoofing - (148)
*Standard Attack PatternStandard Attack PatternChecksum Spoofing - (145)Checksum Spoofing - (145)
*Standard Attack PatternStandard Attack PatternIntent Spoof - (502)Intent Spoof - (502)
+Meta Attack PatternMeta Attack PatternIdentity Spoofing - (151)Identity Spoofing - (151)
+Standard Attack PatternStandard Attack PatternFake the Source of Data - (194)Fake the Source of Data - (194)
*Detailed Attack PatternDetailed Attack PatternCounterfeit Websites - (543)Counterfeit Websites - (543)
*Detailed Attack PatternDetailed Attack PatternCounterfeit Organizations - (544)Counterfeit Organizations - (544)
*Standard Attack PatternStandard Attack PatternPrincipal Spoof - (195)Principal Spoof - (195)
+Standard Attack PatternStandard Attack PatternSignature Spoof - (473)Signature Spoof - (473)
*Standard Attack PatternStandard Attack PatternPharming - (89)Pharming - (89)
+Standard Attack PatternStandard Attack PatternPhishing - (98)Phishing - (98)
*Standard Attack PatternStandard Attack PatternSpear Phishing - (163)Spear Phishing - (163)
+Meta Attack PatternMeta Attack PatternResource Location Spoofing - (154)Resource Location Spoofing - (154)
+Meta Attack PatternMeta Attack PatternAction Spoofing - (173)Action Spoofing - (173)
+Standard Attack PatternStandard Attack PatternClickjacking - (103)Clickjacking - (103)
*Standard Attack PatternStandard Attack PatternFlash File Overlay - (181)Flash File Overlay - (181)
*Standard Attack PatternStandard Attack PatterniFrame Overlay - (222)iFrame Overlay - (222)
*Detailed Attack PatternDetailed Attack PatternActivity Hijack - (501)Activity Hijack - (501)
*Detailed Attack PatternDetailed Attack PatternTask Impersonation - (504)Task Impersonation - (504)
*Detailed Attack PatternDetailed Attack PatternScheme Squatting - (505)Scheme Squatting - (505)
*Standard Attack PatternStandard Attack PatternTapjacking - (506)Tapjacking - (506)
+CategoryCategoryManipulate Timing and State - (172)Manipulate Timing and State - (172)
+CategoryCategoryAbuse of Functionality - (210)Abuse of Functionality - (210)
+Standard Attack PatternStandard Attack PatternAPI Abuse/Misuse - (113)API Abuse/Misuse - (113)
*Standard Attack PatternStandard Attack PatternTry All Common Application Switches and Options - (133)Try All Common Application Switches and Options - (133)
+Standard Attack PatternStandard Attack PatternCache Poisoning - (141)Cache Poisoning - (141)
*Standard Attack PatternStandard Attack PatternDNS Cache Poisoning - (142)DNS Cache Poisoning - (142)
+Meta Attack PatternMeta Attack PatternFunctionality Misuse - (212)Functionality Misuse - (212)
*Standard Attack PatternStandard Attack PatternDirectory Traversal - (213)Directory Traversal - (213)
+Meta Attack PatternMeta Attack PatternAbuse of Communication Channels - (216)Abuse of Communication Channels - (216)
*Detailed Attack PatternDetailed Attack PatternSocket Capable Browser Plugins Result In Transparent Proxy Abuse - (465)Socket Capable Browser Plugins Result In Transparent Proxy Abuse - (465)
*Detailed Attack PatternDetailed Attack PatternPassing Local Filenames to Functions That Expect a URL - (48)Passing Local Filenames to Functions That Expect a URL - (48)
+Standard Attack PatternStandard Attack PatternForceful Browsing - (87)Forceful Browsing - (87)
*Detailed Attack PatternDetailed Attack PatternWSDL Scanning - (95)WSDL Scanning - (95)
+CategoryCategoryProbabilistic Techniques - (223)Probabilistic Techniques - (223)
+CategoryCategoryExploitation of Authentication - (225)Exploitation of Authentication - (225)
+Standard Attack PatternStandard Attack PatternAuthentication Abuse - (114)Authentication Abuse - (114)
+Standard Attack PatternStandard Attack PatternAuthentication Bypass - (115)Authentication Bypass - (115)
+Standard Attack PatternStandard Attack PatternExploitation of Session Variables, Resource IDs and other Trusted Credentials - (21)Exploitation of Session Variables, Resource IDs and other Trusted Credentials - (21)
+CategoryCategoryExploitation of Authorization - (232)Exploitation of Authorization - (232)
+CategoryCategoryPrivilege Escalation - (233)Privilege Escalation - (233)
+Meta Attack PatternMeta Attack PatternPrivilege Abuse - (122)Privilege Abuse - (122)
+Meta Attack PatternMeta Attack PatternExploiting Trust in Client (aka Make the Client Invisible) - (22)Exploiting Trust in Client (aka Make the Client Invisible) - (22)
*Standard Attack PatternStandard Attack PatternCreate Malicious Client - (202)Create Malicious Client - (202)
+Standard Attack PatternStandard Attack PatternRemoving Important Functionality from the Client - (207)Removing Important Functionality from the Client - (207)
+Standard Attack PatternStandard Attack PatternManipulating User-Controlled Variables - (77)Manipulating User-Controlled Variables - (77)
+Standard Attack PatternStandard Attack PatternMan in the Middle Attack - (94)Man in the Middle Attack - (94)
*Standard Attack PatternStandard Attack PatternHijacking a privileged process - (234)Hijacking a privileged process - (234)
+Detailed Attack PatternDetailed Attack PatternCatching exception throw/signal from privileged block - (236)Catching exception throw/signal from privileged block - (236)
+Standard Attack PatternStandard Attack PatternHijacking a Privileged Thread of Execution - (30)Hijacking a Privileged Thread of Execution - (30)
+Standard Attack PatternStandard Attack PatternSubvert Code-signing Facilities - (68)Subvert Code-signing Facilities - (68)
*Standard Attack PatternStandard Attack PatternTarget Programs with Elevated Privileges - (69)Target Programs with Elevated Privileges - (69)
+CategoryCategoryManipulate Data Structures - (255)Manipulate Data Structures - (255)
+Meta Attack PatternMeta Attack PatternBuffer Manipulation - (123)Buffer Manipulation - (123)
+Standard Attack PatternStandard Attack PatternOverflow Buffers - (100)Overflow Buffers - (100)
*Detailed Attack PatternDetailed Attack PatternSOAP Array Overflow - (256)SOAP Array Overflow - (256)
*Detailed Attack PatternDetailed Attack PatternMIME Conversion - (42)MIME Conversion - (42)
*Detailed Attack PatternDetailed Attack PatternOverflow Variables and Tags - (46)Overflow Variables and Tags - (46)
*Standard Attack PatternStandard Attack PatternOverread Buffers - (540)Overread Buffers - (540)
*Standard Attack PatternStandard Attack PatternAttack through Shared Data - (124)Attack through Shared Data - (124)
+Standard Attack PatternStandard Attack PatternInteger Attacks - (128)Integer Attacks - (128)
*Standard Attack PatternStandard Attack PatternForced Integer Overflow - (92)Forced Integer Overflow - (92)
*Standard Attack PatternStandard Attack PatternPointer Attack - (129)Pointer Attack - (129)
*Detailed Attack PatternDetailed Attack PatternAccessing/Intercepting/Modifying HTTP Cookies - (31)Accessing/Intercepting/Modifying HTTP Cookies - (31)
+CategoryCategoryManipulate Resources - (262)Manipulate Resources - (262)
+Standard Attack PatternStandard Attack PatternInput Data Manipulation - (153)Input Data Manipulation - (153)
+Standard Attack PatternStandard Attack PatternLeverage Alternate Encoding - (267)Leverage Alternate Encoding - (267)
*Standard Attack PatternStandard Attack PatternDouble Encoding - (120)Double Encoding - (120)
+Meta Attack PatternMeta Attack PatternResource Location Spoofing - (154)Resource Location Spoofing - (154)
+Standard Attack PatternStandard Attack PatternInfrastructure Manipulation - (161)Infrastructure Manipulation - (161)
*Standard Attack PatternStandard Attack PatternDNS Cache Poisoning - (142)DNS Cache Poisoning - (142)
*Standard Attack PatternStandard Attack PatternPharming - (89)Pharming - (89)
+Meta Attack PatternMeta Attack PatternFile Manipulation - (165)File Manipulation - (165)
+Standard Attack PatternStandard Attack PatternVariable Manipulation - (171)Variable Manipulation - (171)
+Meta Attack PatternMeta Attack PatternConfiguration/Environment manipulation - (176)Configuration/Environment manipulation - (176)
*Meta Attack PatternMeta Attack PatternAbuse of Transaction Data Structure - (257)Abuse of Transaction Data Structure - (257)
+Meta Attack PatternMeta Attack PatternAudit Log Manipulation - (268)Audit Log Manipulation - (268)
+Meta Attack PatternMeta Attack PatternSchema Poisoning - (271)Schema Poisoning - (271)
*Standard Attack PatternStandard Attack PatternXML Schema Poisoning - (146)XML Schema Poisoning - (146)
+Meta Attack PatternMeta Attack PatternProtocol Manipulation - (272)Protocol Manipulation - (272)
+Standard Attack PatternStandard Attack PatternClient-Server Protocol Manipulation - (220)Client-Server Protocol Manipulation - (220)
*Standard Attack PatternStandard Attack PatternDNS Rebinding - (275)DNS Rebinding - (275)
+Meta Attack PatternMeta Attack PatternWeb Services Protocol Manipulation - (278)Web Services Protocol Manipulation - (278)
+Standard Attack PatternStandard Attack PatternXML External Entities - (221)XML External Entities - (221)
*Detailed Attack PatternDetailed Attack PatternXML Entity Blowup - (201)XML Entity Blowup - (201)
+Standard Attack PatternStandard Attack PatternSoap Manipulation - (279)Soap Manipulation - (279)
*Detailed Attack PatternDetailed Attack PatternSOAP Parameter Tampering - (280)SOAP Parameter Tampering - (280)
*Detailed Attack PatternDetailed Attack PatternAccessing/Intercepting/Modifying HTTP Cookies - (31)Accessing/Intercepting/Modifying HTTP Cookies - (31)
*Meta Attack PatternMeta Attack PatternContaminate Resource - (548)Contaminate Resource - (548)
+CategoryCategoryAnalyze Target - (281)Analyze Target - (281)
+Meta Attack PatternMeta Attack PatternReverse Engineering - (188)Reverse Engineering - (188)
+Meta Attack PatternMeta Attack PatternSoftware Reverse Engineering - (189)Software Reverse Engineering - (189)
+Standard Attack PatternStandard Attack PatternLifting Sensitive Data from the Client - (167)Lifting Sensitive Data from the Client - (167)
+Standard Attack PatternStandard Attack PatternLifting Data Embedded in Client Distributions - (37)Lifting Data Embedded in Client Distributions - (37)
*Standard Attack PatternStandard Attack PatternProtocol Reverse Engineering - (192)Protocol Reverse Engineering - (192)
+Meta Attack PatternMeta Attack PatternCryptanalysis - (97)Cryptanalysis - (97)
*Standard Attack PatternStandard Attack PatternPadding Oracle Crypto Attack - (463)Padding Oracle Crypto Attack - (463)
+CategoryCategoryGain Physical Access - (436)Gain Physical Access - (436)
+CategoryCategoryMalicious Code Execution - (525)Malicious Code Execution - (525)
*Meta Attack PatternMeta Attack PatternTargeted Malware - (542)Targeted Malware - (542)
+CategoryCategoryAlter System Components - (526)Alter System Components - (526)
+Meta Attack PatternMeta Attack PatternSoftware Integrity Attacks - (184)Software Integrity Attacks - (184)
*Standard Attack PatternStandard Attack PatternMalicious Software Download - (185)Malicious Software Download - (185)
+Meta Attack PatternMeta Attack PatternHacking Hardware Devices or Components - (401)Hacking Hardware Devices or Components - (401)
+Meta Attack PatternMeta Attack PatternMalicious Logic Inserted Into to Product - (441)Malicious Logic Inserted Into to Product - (441)
*Meta Attack PatternMeta Attack PatternPhysical Destruction of Device or Component - (547)Physical Destruction of Device or Component - (547)
+CategoryCategoryManipulate System Users - (527)Manipulate System Users - (527)
+Meta Attack PatternMeta Attack PatternTarget Influence via Social Engineering - (416)Target Influence via Social Engineering - (416)
+Meta Attack PatternMeta Attack PatternTarget Influence via Psychological Principles - (427)Target Influence via Psychological Principles - (427)
Back to top