Prerrequisitos
A means by which to interact with the target system directly.
Habilidades requeridas
Some fingerprinting activity requires very specific knowledge of how different operating systems respond to various TCP/IP requests. Application fingerprinting can be as easy as envoking the application with the correct command line argument, or mouse clicking in the appropriate place on the screen.
Recursos requeridos
If on a network, the adversary needs a tool capable of viewing network communications at the packet level and with header information, like Mitmproxy, Wireshark, or Fiddler.
Mitigaciones
While some information is shared by systems automatically based on standards and protocols, remove potentially sensitive information that is not necessary for the application's functionality as much as possible.
Debilidades relacionadas
| CWE-ID |
Nombre de la debilidad |
|
Exposure of Sensitive Information to an Unauthorized Actor The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Envío
| Nombre |
Organización |
Fecha |
Fecha de lanzamiento |
| CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Modificaciones
| Nombre |
Organización |
Fecha |
Comentario |
| CAPEC Content Team |
The MITRE Corporation |
2017-01-09 +00:00 |
Updated Related_Attack_Patterns |
| CAPEC Content Team |
The MITRE Corporation |
2017-05-01 +00:00 |
Updated Attack_Motivation-Consequences, Attack_Prerequisites, Attacker_Skills_or_Knowledge_Required, Description Summary, Related_Weaknesses, Resources_Required, Solutions_and_Mitigations, Typical_Likelihood_of_Exploit |
| CAPEC Content Team |
The MITRE Corporation |
2018-07-31 +00:00 |
Updated Attacker_Skills_or_Knowledge_Required |
| CAPEC Content Team |
The MITRE Corporation |
2020-12-17 +00:00 |
Updated Description, Taxonomy_Mappings |