Meta Attack PatternMeta Attack Pattern Action Spoofing - (173)
Meta Attack PatternMeta Attack Pattern API Manipulation - (113)
Meta Attack PatternMeta Attack Pattern Application API Message Manipulation via Man-in-the-Middle - (384)
Meta Attack PatternMeta Attack Pattern Authentication Abuse - (114)
Meta Attack PatternMeta Attack Pattern Authentication Bypass - (115)
Meta Attack PatternMeta Attack Pattern Brute Force - (112)
Meta Attack PatternMeta Attack Pattern Buffer Manipulation - (123)
Meta Attack PatternMeta Attack Pattern Bypassing Physical Locks - (391)
Meta Attack PatternMeta Attack Pattern Bypassing Physical Security - (390)
Meta Attack PatternMeta Attack Pattern Code Inclusion - (175)
Meta Attack PatternMeta Attack Pattern Code Injection - (242)
Meta Attack PatternMeta Attack Pattern Command Injection - (248)
Meta Attack PatternMeta Attack Pattern Communication Channel Manipulation - (216)
Meta Attack PatternMeta Attack Pattern Configuration/Environment Manipulation - (176)
Meta Attack PatternMeta Attack Pattern Contaminate Resource - (548)
Meta Attack PatternMeta Attack Pattern Content Spoofing - (148)
DeprecatedDeprecated DEPRECATED: Abuse of Transaction Data Structure - (257)
DeprecatedDeprecated DEPRECATED: Code Injection - (241)
DeprecatedDeprecated DEPRECATED: Degradation - (602)
DeprecatedDeprecated DEPRECATED: Environment Variable Manipulation - (264)
DeprecatedDeprecated DEPRECATED: Global variable manipulation - (265)
DeprecatedDeprecated DEPRECATED: ICMP Echo Request Ping - (288)
DeprecatedDeprecated DEPRECATED: Information Gathering from Non-Traditional Sources - (409)
DeprecatedDeprecated DEPRECATED: Information Gathering from Traditional Sources - (408)
DeprecatedDeprecated DEPRECATED: Infrastructure-based footprinting - (289)
DeprecatedDeprecated DEPRECATED: Manipulate Canonicalization - (266)
DeprecatedDeprecated DEPRECATED: Pretexting - (411)
DeprecatedDeprecated DEPRECATED: Registry Manipulation - (269)
DeprecatedDeprecated DEPRECATED: Social Information Gathering Attacks - (404)
DeprecatedDeprecated DEPRECATED: Social Information Gathering via Research - (405)
DeprecatedDeprecated DEPRECATED: Target Influence via Perception of Concession - (419)
DeprecatedDeprecated DEPRECATED: Variable Manipulation - (171)
Meta Attack PatternMeta Attack Pattern Excavation - (116)
Meta Attack PatternMeta Attack Pattern Excessive Allocation - (130)
Meta Attack PatternMeta Attack Pattern Exploitation of Trusted Credentials - (21)
Meta Attack PatternMeta Attack Pattern Exploiting Trust in Client - (22)
Meta Attack PatternMeta Attack Pattern Fault Injection - (624)
Meta Attack PatternMeta Attack Pattern File Manipulation - (165)
Meta Attack PatternMeta Attack Pattern Fingerprinting - (224)
Meta Attack PatternMeta Attack Pattern Flooding - (125)
Meta Attack PatternMeta Attack Pattern Footprinting - (169)
Meta Attack PatternMeta Attack Pattern Forced Deadlock - (25)
Meta Attack PatternMeta Attack Pattern Functionality Bypass - (554)
Meta Attack PatternMeta Attack Pattern Functionality Misuse - (212)
Meta Attack PatternMeta Attack Pattern Fuzzing - (28)
Meta Attack PatternMeta Attack Pattern Hardware Integrity Attack - (440)
Meta Attack PatternMeta Attack Pattern Identity Spoofing - (151)
Meta Attack PatternMeta Attack Pattern Information Elicitation - (410)
Meta Attack PatternMeta Attack Pattern Infrastructure Manipulation - (161)
Meta Attack PatternMeta Attack Pattern Input Data Manipulation - (153)
Meta Attack PatternMeta Attack Pattern Interception - (117)
Meta Attack PatternMeta Attack Pattern Leveraging Active Man in the Middle Attacks to Bypass Same Origin Policy - (466)
Meta Attack PatternMeta Attack Pattern Leveraging Race Conditions - (26)
Meta Attack PatternMeta Attack Pattern Local Execution of Code - (549)
Meta Attack PatternMeta Attack Pattern Lock Bumping - (392)
Meta Attack PatternMeta Attack Pattern Malicious Logic Insertion - (441)
Meta Attack PatternMeta Attack Pattern Manipulate Human Behavior - (416)
Meta Attack PatternMeta Attack Pattern Manipulating User State - (74)
Meta Attack PatternMeta Attack Pattern Manipulation During Distribution - (439)
Meta Attack PatternMeta Attack Pattern Modification During Manufacture - (438)
Meta Attack PatternMeta Attack Pattern Object Injection - (586)
Meta Attack PatternMeta Attack Pattern Obstruction - (607)
Meta Attack PatternMeta Attack Pattern Parameter Injection - (137)
Meta Attack PatternMeta Attack Pattern Physical Theft - (507)
Meta Attack PatternMeta Attack Pattern Pointer Manipulation - (129)
Meta Attack PatternMeta Attack Pattern Privilege Abuse - (122)
Meta Attack PatternMeta Attack Pattern Privilege Escalation - (233)
Meta Attack PatternMeta Attack Pattern Protocol Analysis - (192)
Meta Attack PatternMeta Attack Pattern Protocol Manipulation - (272)
Meta Attack PatternMeta Attack Pattern Resource Injection - (240)
Meta Attack PatternMeta Attack Pattern Resource Leak Exposure - (131)
Meta Attack PatternMeta Attack Pattern Resource Location Spoofing - (154)
Meta Attack PatternMeta Attack Pattern Reverse Engineering - (188)
Meta Attack PatternMeta Attack Pattern Shared Data Manipulation - (124)
Meta Attack PatternMeta Attack Pattern Software Integrity Attack - (184)
Meta Attack PatternMeta Attack Pattern Sustained Client Engagement - (227)
Meta Attack PatternMeta Attack Pattern Target Influence via Eye Cues - (429)
Meta Attack PatternMeta Attack Pattern Target Influence via Instant Rapport - (435)
Meta Attack PatternMeta Attack Pattern Target Influence via Interview and Interrogation - (434)
Meta Attack PatternMeta Attack Pattern Target Influence via Micro-Expressions - (430)
Meta Attack PatternMeta Attack Pattern Target Influence via Neuro-Linguistic Programming (NLP) - (431)
Meta Attack PatternMeta Attack Pattern Target Influence via The Human Buffer Overflow - (433)
Meta Attack PatternMeta Attack Pattern Target Influence via Voice in NLP - (432)
Meta Attack PatternMeta Attack Pattern Traffic Injection - (594)
Meta Attack PatternMeta Attack Pattern Web Services Protocol Manipulation - (278)