Meta Attack Pattern
Action Spoofing
-
(173)
Meta Attack Pattern
API Manipulation
-
(113)
Meta Attack Pattern
Application API Message Manipulation via Man-in-the-Middle
-
(384)
Meta Attack Pattern
Authentication Abuse
-
(114)
Meta Attack Pattern
Authentication Bypass
-
(115)
Meta Attack Pattern
Brute Force
-
(112)
Meta Attack Pattern
Buffer Manipulation
-
(123)
Meta Attack Pattern
Bypassing Physical Locks
-
(391)
Meta Attack Pattern
Bypassing Physical Security
-
(390)
Meta Attack Pattern
Code Inclusion
-
(175)
Meta Attack Pattern
Code Injection
-
(242)
Meta Attack Pattern
Command Injection
-
(248)
Meta Attack Pattern
Communication Channel Manipulation
-
(216)
Meta Attack Pattern
Configuration/Environment Manipulation
-
(176)
Meta Attack Pattern
Contaminate Resource
-
(548)
Meta Attack Pattern
Content Spoofing
-
(148)
Deprecated
DEPRECATED: Abuse of Transaction Data Structure
-
(257)
Deprecated
DEPRECATED: Code Injection
-
(241)
Deprecated
DEPRECATED: Degradation
-
(602)
Deprecated
DEPRECATED: Environment Variable Manipulation
-
(264)
Deprecated
DEPRECATED: Global variable manipulation
-
(265)
Deprecated
DEPRECATED: ICMP Echo Request Ping
-
(288)
Deprecated
DEPRECATED: Information Gathering from Non-Traditional Sources
-
(409)
Deprecated
DEPRECATED: Information Gathering from Traditional Sources
-
(408)
Deprecated
DEPRECATED: Infrastructure-based footprinting
-
(289)
Deprecated
DEPRECATED: Manipulate Canonicalization
-
(266)
Deprecated
DEPRECATED: Pretexting
-
(411)
Deprecated
DEPRECATED: Registry Manipulation
-
(269)
Deprecated
DEPRECATED: Social Information Gathering Attacks
-
(404)
Deprecated
DEPRECATED: Social Information Gathering via Research
-
(405)
Deprecated
DEPRECATED: Target Influence via Perception of Concession
-
(419)
Deprecated
DEPRECATED: Variable Manipulation
-
(171)
Meta Attack Pattern
Excavation
-
(116)
Meta Attack Pattern
Excessive Allocation
-
(130)
Meta Attack Pattern
Exploitation of Trusted Credentials
-
(21)
Meta Attack Pattern
Exploiting Trust in Client
-
(22)
Meta Attack Pattern
Fault Injection
-
(624)
Meta Attack Pattern
File Manipulation
-
(165)
Meta Attack Pattern
Fingerprinting
-
(224)
Meta Attack Pattern
Flooding
-
(125)
Meta Attack Pattern
Footprinting
-
(169)
Meta Attack Pattern
Forced Deadlock
-
(25)
Meta Attack Pattern
Functionality Bypass
-
(554)
Meta Attack Pattern
Functionality Misuse
-
(212)
Meta Attack Pattern
Fuzzing
-
(28)
Meta Attack Pattern
Hardware Integrity Attack
-
(440)
Meta Attack Pattern
Identity Spoofing
-
(151)
Meta Attack Pattern
Information Elicitation
-
(410)
Meta Attack Pattern
Infrastructure Manipulation
-
(161)
Meta Attack Pattern
Input Data Manipulation
-
(153)
Meta Attack Pattern
Interception
-
(117)
Meta Attack Pattern
Leveraging Active Man in the Middle Attacks to Bypass Same Origin Policy
-
(466)
Meta Attack Pattern
Leveraging Race Conditions
-
(26)
Meta Attack Pattern
Local Execution of Code
-
(549)
Meta Attack Pattern
Lock Bumping
-
(392)
Meta Attack Pattern
Malicious Logic Insertion
-
(441)
Meta Attack Pattern
Manipulate Human Behavior
-
(416)
Meta Attack Pattern
Manipulating User State
-
(74)
Meta Attack Pattern
Manipulation During Distribution
-
(439)
Meta Attack Pattern
Modification During Manufacture
-
(438)
Meta Attack Pattern
Object Injection
-
(586)
Meta Attack Pattern
Obstruction
-
(607)
Meta Attack Pattern
Parameter Injection
-
(137)
Meta Attack Pattern
Physical Theft
-
(507)
Meta Attack Pattern
Pointer Manipulation
-
(129)
Meta Attack Pattern
Privilege Abuse
-
(122)
Meta Attack Pattern
Privilege Escalation
-
(233)
Meta Attack Pattern
Protocol Analysis
-
(192)
Meta Attack Pattern
Protocol Manipulation
-
(272)
Meta Attack Pattern
Resource Injection
-
(240)
Meta Attack Pattern
Resource Leak Exposure
-
(131)
Meta Attack Pattern
Resource Location Spoofing
-
(154)
Meta Attack Pattern
Reverse Engineering
-
(188)
Meta Attack Pattern
Shared Data Manipulation
-
(124)
Meta Attack Pattern
Software Integrity Attack
-
(184)
Meta Attack Pattern
Sustained Client Engagement
-
(227)
Meta Attack Pattern
Target Influence via Eye Cues
-
(429)
Meta Attack Pattern
Target Influence via Instant Rapport
-
(435)
Meta Attack Pattern
Target Influence via Interview and Interrogation
-
(434)
Meta Attack Pattern
Target Influence via Micro-Expressions
-
(430)
Meta Attack Pattern
Target Influence via Neuro-Linguistic Programming (NLP)
-
(431)
Meta Attack Pattern
Target Influence via The Human Buffer Overflow
-
(433)
Meta Attack Pattern
Target Influence via Voice in NLP
-
(432)
Meta Attack Pattern
Traffic Injection
-
(594)
Meta Attack Pattern
Web Services Protocol Manipulation
-
(278)